Analysis
-
max time kernel
34s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 04:24
Static task
static1
Behavioral task
behavioral1
Sample
205901f209731db929cc89e93d986dd5025aabc25c57ad4e342ba21d175aab96.vbs
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
205901f209731db929cc89e93d986dd5025aabc25c57ad4e342ba21d175aab96.vbs
Resource
win10v2004-20250314-en
General
-
Target
205901f209731db929cc89e93d986dd5025aabc25c57ad4e342ba21d175aab96.vbs
-
Size
25KB
-
MD5
4b45ab4778ed8bf951c470d5ae0e550c
-
SHA1
5bc0146efccad916625ac9bf231f511fd8a7f5d1
-
SHA256
bc4707c1d81c7978cf963c26b3cc69585cb8aaa8e4b5859cc4688220db88f9d0
-
SHA512
a1368167d731d2587158ecc1b104b8e410da305adb58bfe556e4cf1b8421009260cf119ba7dade1ea833fa3628d801507daee08c897d9d0150d7e64dcb38ef80
-
SSDEEP
384:y8enbIbpBStxYUQHSH7l+ix/J/b6GvPCSy+tNywUWZEC:inucJb6HAUvC
Malware Config
Extracted
phorphiex
http://185.215.113.66/
http://45.93.20.18/
TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6
qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9
AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z
LdgchXq1sKbAaAJ1EXAPSRBzLb8jnTZstT
MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q
4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK
XryzFMFVpDUvU7famUGf214EXD3xNUSmQf
0xCa90599132C4D88907Bd8E046540284aa468a035
15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC
1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK
ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp
3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc
3ESHude8zUHksQg1h6hHmzY79BS36L91Yn
CSLKveRL2zqkbV2TqiFVuW6twtpqgFajoUZLAJQTTQk2
DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA
t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh
stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj
bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2
bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr
bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd
GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3
bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
-
mutex
k9ubbn6sdfs
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\205901f209731db929cc89e93d986dd5025aabc25c57ad4e342ba21d175aab96.vbs" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\205901f209731db929cc89e93d986dd5025aabc25c57ad4e342ba21d175aab96.vbs" wscript.exe -
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule behavioral2/files/0x000d0000000243d5-1120.dat family_phorphiex -
UAC bypass 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wscript.exe -
Xmrig family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral2/memory/10660-1219-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/10660-1220-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/10660-1218-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/10660-1217-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/10660-1216-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/10660-1214-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/10660-1213-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/10660-1221-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral2/memory/10660-1222-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Blocklisted process makes network request 5 IoCs
flow pid Process 9 3168 wscript.exe 11 3168 wscript.exe 15 3168 wscript.exe 24 3168 wscript.exe 124 3168 wscript.exe -
Blocks application from running via registry modification 14 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "msconfig.exe" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "gpedit.msc" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "SystemSettings.exe" wscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "msconfig.exe" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "Autoruns.exe" wscript.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "Autoruns.exe" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "procexp.exe" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "gpedit.msc" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "SystemSettings.exe" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "procexp.exe" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" wscript.exe -
Creates new service(s) 2 TTPs
-
pid Process 4896 wbadmin.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" wscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" wscript.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts wscript.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\Debugger wscript.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe wscript.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\205901f209731db929cc89e93d986dd5025aabc25c57ad4e342ba21d175aab96.vbs" wscript.exe -
Stops running service(s) 4 TTPs
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MyStartupScript = "C:\\Users\\Admin\\AppData\\Local\\Temp\\205901f209731db929cc89e93d986dd5025aabc25c57ad4e342ba21d175aab96.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msvcr80dll = "C:\\Windows\\SysWOW64\\msvcr80.dll.bat" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msvcr80dll = "C:\\Windows\\SysWOW64\\msvcr80.dll.bat" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win32Updater = "C:\\Windows\\System32\\systemconfig.exe.vbs" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Anti-VirusScript = "C:\\Windows\\System32\\systemconfig.exe.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\advapi32_ext = "C:\\Windows\\advapi32_ext.vbs" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\advapi32_ext = "C:\\Windows\\advapi32_ext.vbs" wscript.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wscript.exe -
pid Process 5876 powershell.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\Debugger wscript.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\msvcr80.dll.bat wscript.exe File opened for modification C:\Windows\SysWOW64\msvcr80.dll.bat wscript.exe File created C:\Windows\System32\systemconfig.exe.vbs wscript.exe File opened for modification C:\Windows\System32\systemconfig.exe.vbs wscript.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\gcrybground.png" wscript.exe -
resource yara_rule behavioral2/memory/10660-1219-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/10660-1220-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/10660-1218-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/10660-1217-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/10660-1216-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/10660-1211-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/10660-1214-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/10660-1207-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/10660-1213-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/10660-1212-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/10660-1210-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/10660-1208-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/10660-1221-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral2/memory/10660-1222-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\advapi32_ext.vbs wscript.exe File opened for modification C:\Windows\advapi32_ext.vbs wscript.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 12124 sc.exe 7576 sc.exe 2880 sc.exe 8144 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4224 vssadmin.exe -
Kills process with taskkill 64 IoCs
pid Process 11080 taskkill.exe 3820 taskkill.exe 10172 taskkill.exe 9436 taskkill.exe 7316 taskkill.exe 8480 taskkill.exe 6568 taskkill.exe 5424 taskkill.exe 6264 taskkill.exe 2036 taskkill.exe 11960 taskkill.exe 716 taskkill.exe 12284 taskkill.exe 11496 taskkill.exe 7076 taskkill.exe 11192 taskkill.exe 6204 taskkill.exe 8124 taskkill.exe 4476 taskkill.exe 7252 taskkill.exe 7548 taskkill.exe 5540 taskkill.exe 6032 taskkill.exe 8892 taskkill.exe 11504 taskkill.exe 12292 taskkill.exe 6248 taskkill.exe 11080 taskkill.exe 2036 taskkill.exe 7672 taskkill.exe 7728 taskkill.exe 9724 taskkill.exe 7824 taskkill.exe 8580 taskkill.exe 9456 taskkill.exe 3836 taskkill.exe 5996 taskkill.exe 13284 taskkill.exe 2072 taskkill.exe 300 taskkill.exe 3224 taskkill.exe 7184 taskkill.exe 4552 taskkill.exe 12800 taskkill.exe 6220 taskkill.exe 7844 taskkill.exe 6168 taskkill.exe 11868 taskkill.exe 4880 taskkill.exe 13240 taskkill.exe 384 taskkill.exe 10564 taskkill.exe 7188 taskkill.exe 9176 taskkill.exe 11700 taskkill.exe 8140 taskkill.exe 11408 taskkill.exe 11704 taskkill.exe 4968 taskkill.exe 8548 taskkill.exe 7064 taskkill.exe 760 taskkill.exe 10096 taskkill.exe 7868 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Control Panel\Mouse wscript.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\Mouse wscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\Mouse\SwapMouseButtons = "1" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\Desktop wscript.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3342763580-2723508992-2885672917-1000\{BD43B5F3-AEB5-4523-8FD8-A0C70ACB3FC1} msedge.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings calc.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings calc.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings calc.exe -
Opens file in notepad (likely ransom note) 18 IoCs
pid Process 8408 notepad.exe 3500 notepad.exe 9424 notepad.exe 9832 notepad.exe 10000 notepad.exe 9476 notepad.exe 13004 notepad.exe 3480 notepad.exe 11292 notepad.exe 10576 notepad.exe 13100 notepad.exe 10028 notepad.exe 12600 notepad.exe 428 notepad.exe 8084 notepad.exe 12364 notepad.exe 5456 notepad.exe 12976 notepad.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 9 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5876 powershell.exe 5876 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 55 IoCs
pid Process 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5876 powershell.exe Token: SeBackupPrivilege 4540 vssvc.exe Token: SeRestorePrivilege 4540 vssvc.exe Token: SeAuditPrivilege 4540 vssvc.exe Token: SeBackupPrivilege 4848 wbengine.exe Token: SeRestorePrivilege 4848 wbengine.exe Token: SeSecurityPrivilege 4848 wbengine.exe Token: SeDebugPrivilege 5672 taskkill.exe Token: SeDebugPrivilege 1600 taskkill.exe Token: SeDebugPrivilege 2224 taskkill.exe Token: SeDebugPrivilege 2328 taskkill.exe Token: SeDebugPrivilege 4004 taskkill.exe Token: SeDebugPrivilege 4476 taskkill.exe Token: SeDebugPrivilege 300 taskkill.exe Token: SeDebugPrivilege 4908 taskkill.exe Token: SeDebugPrivilege 3224 taskkill.exe Token: SeSystemtimePrivilege 3916 cmd.exe Token: SeSystemtimePrivilege 3916 cmd.exe Token: SeDebugPrivilege 5208 taskkill.exe Token: SeDebugPrivilege 2028 taskkill.exe Token: SeDebugPrivilege 3276 taskkill.exe Token: SeDebugPrivilege 6048 taskkill.exe Token: SeSystemtimePrivilege 2012 cmd.exe Token: SeSystemtimePrivilege 2012 cmd.exe Token: SeSystemtimePrivilege 4248 cmd.exe Token: SeSystemtimePrivilege 4248 cmd.exe Token: SeSystemtimePrivilege 5208 cmd.exe Token: SeSystemtimePrivilege 5208 cmd.exe Token: SeSystemtimePrivilege 1916 cmd.exe Token: SeSystemtimePrivilege 1916 cmd.exe Token: SeSystemtimePrivilege 5480 cmd.exe Token: SeSystemtimePrivilege 5480 cmd.exe Token: SeDebugPrivilege 6572 taskkill.exe Token: SeSystemtimePrivilege 2744 cmd.exe Token: SeSystemtimePrivilege 2744 cmd.exe Token: SeSystemtimePrivilege 5248 cmd.exe Token: SeSystemtimePrivilege 5248 cmd.exe Token: SeSystemtimePrivilege 2004 cmd.exe Token: SeSystemtimePrivilege 2004 cmd.exe Token: SeSystemtimePrivilege 4972 cmd.exe Token: SeSystemtimePrivilege 4972 cmd.exe Token: SeSystemtimePrivilege 3652 cmd.exe Token: SeSystemtimePrivilege 3652 cmd.exe Token: SeSystemtimePrivilege 1628 cmd.exe Token: SeSystemtimePrivilege 1628 cmd.exe Token: SeSystemtimePrivilege 5592 cmd.exe Token: SeSystemtimePrivilege 5592 cmd.exe Token: SeSystemtimePrivilege 3264 cmd.exe Token: SeSystemtimePrivilege 3264 cmd.exe Token: SeSystemtimePrivilege 5716 cmd.exe Token: SeSystemtimePrivilege 5716 cmd.exe Token: SeDebugPrivilege 6164 taskkill.exe Token: SeSystemtimePrivilege 6844 cmd.exe Token: SeSystemtimePrivilege 6844 cmd.exe Token: SeSystemtimePrivilege 1764 cmd.exe Token: SeSystemtimePrivilege 1764 cmd.exe Token: SeSystemtimePrivilege 6960 cmd.exe Token: SeSystemtimePrivilege 6888 cmd.exe Token: SeSystemtimePrivilege 6888 cmd.exe Token: SeSystemtimePrivilege 6960 cmd.exe Token: SeSystemtimePrivilege 6884 cmd.exe Token: SeSystemtimePrivilege 6884 cmd.exe Token: SeSystemtimePrivilege 6388 cmd.exe Token: SeSystemtimePrivilege 6388 cmd.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5024 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5568 OpenWith.exe 3052 OpenWith.exe 1628 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5940 wrote to memory of 3168 5940 WScript.exe 87 PID 5940 wrote to memory of 3168 5940 WScript.exe 87 PID 3168 wrote to memory of 5876 3168 wscript.exe 88 PID 3168 wrote to memory of 5876 3168 wscript.exe 88 PID 3168 wrote to memory of 5180 3168 wscript.exe 90 PID 3168 wrote to memory of 5180 3168 wscript.exe 90 PID 3168 wrote to memory of 1400 3168 wscript.exe 93 PID 3168 wrote to memory of 1400 3168 wscript.exe 93 PID 3168 wrote to memory of 4956 3168 wscript.exe 95 PID 3168 wrote to memory of 4956 3168 wscript.exe 95 PID 4956 wrote to memory of 4224 4956 cmd.exe 98 PID 4956 wrote to memory of 4224 4956 cmd.exe 98 PID 3168 wrote to memory of 5240 3168 wscript.exe 102 PID 3168 wrote to memory of 5240 3168 wscript.exe 102 PID 5240 wrote to memory of 4896 5240 cmd.exe 104 PID 5240 wrote to memory of 4896 5240 cmd.exe 104 PID 3168 wrote to memory of 428 3168 wscript.exe 108 PID 3168 wrote to memory of 428 3168 wscript.exe 108 PID 3168 wrote to memory of 3224 3168 wscript.exe 162 PID 3168 wrote to memory of 3224 3168 wscript.exe 162 PID 3168 wrote to memory of 2864 3168 wscript.exe 112 PID 3168 wrote to memory of 2864 3168 wscript.exe 112 PID 3168 wrote to memory of 1580 3168 wscript.exe 114 PID 3168 wrote to memory of 1580 3168 wscript.exe 114 PID 3168 wrote to memory of 5536 3168 wscript.exe 115 PID 3168 wrote to memory of 5536 3168 wscript.exe 115 PID 5536 wrote to memory of 5672 5536 wscript.exe 116 PID 5536 wrote to memory of 5672 5536 wscript.exe 116 PID 1580 wrote to memory of 3876 1580 wscript.exe 118 PID 1580 wrote to memory of 3876 1580 wscript.exe 118 PID 2864 wrote to memory of 5308 2864 cmd.exe 172 PID 2864 wrote to memory of 5308 2864 cmd.exe 172 PID 2864 wrote to memory of 2668 2864 cmd.exe 324 PID 2864 wrote to memory of 2668 2864 cmd.exe 324 PID 2864 wrote to memory of 1712 2864 cmd.exe 122 PID 2864 wrote to memory of 1712 2864 cmd.exe 122 PID 2864 wrote to memory of 684 2864 cmd.exe 123 PID 2864 wrote to memory of 684 2864 cmd.exe 123 PID 2864 wrote to memory of 5780 2864 cmd.exe 125 PID 2864 wrote to memory of 5780 2864 cmd.exe 125 PID 2864 wrote to memory of 5524 2864 cmd.exe 126 PID 2864 wrote to memory of 5524 2864 cmd.exe 126 PID 3876 wrote to memory of 5936 3876 wscript.exe 127 PID 3876 wrote to memory of 5936 3876 wscript.exe 127 PID 5936 wrote to memory of 2688 5936 wscript.exe 131 PID 5936 wrote to memory of 2688 5936 wscript.exe 131 PID 2688 wrote to memory of 5484 2688 wscript.exe 134 PID 2688 wrote to memory of 5484 2688 wscript.exe 134 PID 5536 wrote to memory of 1600 5536 wscript.exe 135 PID 5536 wrote to memory of 1600 5536 wscript.exe 135 PID 5484 wrote to memory of 4916 5484 wscript.exe 137 PID 5484 wrote to memory of 4916 5484 wscript.exe 137 PID 5536 wrote to memory of 2224 5536 wscript.exe 138 PID 5536 wrote to memory of 2224 5536 wscript.exe 138 PID 4916 wrote to memory of 2144 4916 wscript.exe 140 PID 4916 wrote to memory of 2144 4916 wscript.exe 140 PID 5536 wrote to memory of 760 5536 wscript.exe 141 PID 5536 wrote to memory of 760 5536 wscript.exe 141 PID 2144 wrote to memory of 1888 2144 wscript.exe 142 PID 2144 wrote to memory of 1888 2144 wscript.exe 142 PID 1888 wrote to memory of 2484 1888 wscript.exe 144 PID 1888 wrote to memory of 2484 1888 wscript.exe 144 PID 5536 wrote to memory of 2328 5536 wscript.exe 145 PID 5536 wrote to memory of 2328 5536 wscript.exe 145 -
System policy modification 1 TTPs 19 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "gpedit.msc" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wscript.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "Autoruns.exe" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoControlPanel = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wscript.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "msconfig.exe" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisableCMD = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\InactivityTimeoutSecs = "0" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "SystemSettings.exe" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "procexp.exe" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun = "1" wscript.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\205901f209731db929cc89e93d986dd5025aabc25c57ad4e342ba21d175aab96.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5940 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\205901f209731db929cc89e93d986dd5025aabc25c57ad4e342ba21d175aab96.vbs" /elevated2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Blocklisted process makes network request
- Blocks application from running via registry modification
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Indicator Removal: Clear Persistence
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3168 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5876
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Program Files\Bitdefender\Bitdefender 2025\bdnserv.exe" -disable3⤵PID:5180
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Program Files (x86)\Kaspersky Lab\Kaspersky Anti-Virus 2025\avp.com" disable3⤵PID:1400
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin delete shadows /all /quiet3⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:4224
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin delete catalog -quiet3⤵
- Suspicious use of WriteProcessMemory
PID:5240 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:4896
-
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\READMEPLEASE.txt3⤵
- Opens file in notepad (likely ransom note)
PID:428
-
-
C:\Windows\System32\RUNDLL32.EXE"C:\Windows\System32\RUNDLL32.EXE" user32.dll,UpdatePerUserSystemParameters3⤵PID:3224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\SysWOW64\msvcr80.dll.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\system32\calc.execalc4⤵
- Modifies registry class
PID:5308
-
-
C:\Windows\system32\cmd.execmd4⤵PID:2668
-
-
C:\Windows\system32\calc.execalc4⤵
- Modifies registry class
PID:1712
-
-
C:\Windows\system32\cmd.execmd4⤵PID:684
-
-
C:\Windows\system32\calc.execalc4⤵
- Modifies registry class
PID:5780
-
-
C:\Windows\system32\cmd.execmd4⤵PID:5524
-
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs3⤵
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs4⤵
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs5⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5936 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs6⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs7⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5484 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs8⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs9⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs10⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs11⤵
- Checks computer location settings
PID:2484 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs12⤵
- Checks computer location settings
PID:1656 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs13⤵
- Checks computer location settings
PID:5876 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs14⤵
- Checks computer location settings
PID:5600 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs15⤵
- Checks computer location settings
PID:5560 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs16⤵
- Checks computer location settings
PID:4224 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs17⤵
- Checks computer location settings
PID:4892 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs18⤵
- Checks computer location settings
PID:4344 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs19⤵
- Checks computer location settings
PID:2020 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs20⤵
- Checks computer location settings
PID:2280 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs21⤵
- Checks computer location settings
PID:5156 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs22⤵
- Checks computer location settings
PID:1064 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs23⤵
- Checks computer location settings
PID:5452 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs24⤵PID:432
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs25⤵
- Checks computer location settings
PID:5532 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs26⤵
- Checks computer location settings
PID:1356 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs27⤵
- Checks computer location settings
PID:6472 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs28⤵
- Checks computer location settings
PID:6792 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs29⤵
- Checks computer location settings
PID:7024 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs30⤵PID:5248
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs31⤵PID:6280
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs32⤵
- Checks computer location settings
PID:6200 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs33⤵
- Checks computer location settings
PID:7112 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs34⤵
- Checks computer location settings
PID:8300 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs35⤵
- Checks computer location settings
PID:8568 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs36⤵
- Checks computer location settings
PID:8692 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs37⤵
- Checks computer location settings
PID:8780 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs38⤵
- Checks computer location settings
PID:8880 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs39⤵
- Checks computer location settings
PID:8996 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs40⤵
- Checks computer location settings
PID:9044 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs41⤵
- Checks computer location settings
PID:9092 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs42⤵
- Checks computer location settings
PID:9180 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs43⤵
- Checks computer location settings
PID:2668 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs44⤵
- Checks computer location settings
PID:4248 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs45⤵
- Checks computer location settings
PID:5700 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs46⤵
- Checks computer location settings
PID:6492 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs47⤵
- Checks computer location settings
PID:8276 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs48⤵
- Checks computer location settings
PID:6408 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs49⤵PID:7772
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs50⤵
- Checks computer location settings
PID:8596 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs51⤵
- Checks computer location settings
PID:8660 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs52⤵
- Checks computer location settings
PID:6776 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs53⤵
- Checks computer location settings
PID:8828 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs54⤵
- Checks computer location settings
PID:6208 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs55⤵
- Checks computer location settings
PID:8892 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs56⤵
- Checks computer location settings
PID:6724 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs57⤵
- Checks computer location settings
PID:8296 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs58⤵
- Checks computer location settings
PID:7116 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs59⤵
- Checks computer location settings
PID:8436 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs60⤵
- Checks computer location settings
PID:9260 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs61⤵
- Checks computer location settings
PID:9308 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs62⤵
- Checks computer location settings
PID:9364 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs63⤵PID:10896
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs64⤵
- Checks computer location settings
PID:11012 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs65⤵
- Checks computer location settings
PID:11144 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs66⤵
- Checks computer location settings
PID:10732 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs67⤵
- Checks computer location settings
PID:11132 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs68⤵
- Checks computer location settings
PID:2032 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs69⤵
- Checks computer location settings
PID:4744 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs70⤵
- Checks computer location settings
PID:11260 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs71⤵
- Checks computer location settings
PID:5508 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs72⤵PID:5264
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs73⤵PID:11352
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs74⤵PID:11444
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs75⤵PID:11532
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs76⤵PID:11632
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs77⤵PID:11720
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs78⤵PID:11808
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs79⤵PID:11908
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs80⤵PID:12040
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs81⤵PID:12180
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs82⤵PID:12248
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs83⤵PID:11276
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs84⤵PID:11516
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs85⤵PID:11940
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs86⤵PID:2672
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs87⤵PID:10848
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs88⤵PID:11732
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs89⤵PID:11768
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs90⤵PID:11620
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs91⤵PID:5232
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs92⤵PID:11300
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs93⤵PID:4292
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs94⤵PID:11840
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs95⤵PID:8496
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs96⤵PID:12328
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs97⤵PID:12384
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs98⤵PID:12436
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs99⤵PID:12488
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs100⤵PID:12540
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs101⤵PID:12592
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs102⤵PID:12664
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs103⤵PID:12716
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs104⤵PID:12768
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs105⤵PID:12824
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs106⤵PID:12884
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs107⤵PID:12936
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs108⤵PID:13036
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs109⤵PID:13092
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs110⤵PID:13148
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\System32\systemconfig.exe.vbs111⤵PID:13200
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:0029⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k29⤵PID:8472
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:0028⤵
- Suspicious use of AdjustPrivilegeToken
PID:6388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k28⤵PID:6344
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:0027⤵
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k27⤵PID:6300
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:0026⤵PID:6148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k26⤵PID:8640
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:0025⤵
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k25⤵PID:6316
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:0024⤵PID:6896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k24⤵PID:8368
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:0023⤵PID:4248
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV124⤵PID:2012
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k23⤵PID:8396
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:0022⤵
- Suspicious use of AdjustPrivilegeToken
PID:6844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k22⤵PID:4528
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:0021⤵
- Suspicious use of AdjustPrivilegeToken
PID:6888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k21⤵PID:4992
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:0020⤵
- Suspicious use of AdjustPrivilegeToken
PID:6960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k20⤵PID:4828
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:0019⤵
- Suspicious use of AdjustPrivilegeToken
PID:6884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k19⤵PID:5320
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:0018⤵
- Suspicious use of AdjustPrivilegeToken
PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k18⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2c8,0x2cc,0x2d0,0x2ac,0x348,0x7ff90f78f208,0x7ff90f78f214,0x7ff90f78f22019⤵PID:6056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1896,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=1944 /prefetch:319⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2020,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=2016 /prefetch:219⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2360,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=2840 /prefetch:819⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3492,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=3520 /prefetch:119⤵PID:5236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3508,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=3540 /prefetch:119⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4852,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=4824 /prefetch:119⤵PID:6552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=5164,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=3584 /prefetch:119⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --always-read-main-dll --field-trial-handle=5216,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=3664 /prefetch:119⤵PID:6736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --always-read-main-dll --field-trial-handle=5460,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=5596 /prefetch:119⤵PID:6752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --always-read-main-dll --field-trial-handle=5444,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=5572 /prefetch:119⤵PID:6300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --always-read-main-dll --field-trial-handle=5224,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=3692 /prefetch:119⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --always-read-main-dll --field-trial-handle=5480,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=5616 /prefetch:119⤵PID:6772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --always-read-main-dll --field-trial-handle=3884,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=3632 /prefetch:119⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --always-read-main-dll --field-trial-handle=5400,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=5532 /prefetch:119⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --always-read-main-dll --field-trial-handle=5324,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=3672 /prefetch:119⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --always-read-main-dll --field-trial-handle=5364,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=3440 /prefetch:119⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=5388,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=5552 /prefetch:119⤵PID:6240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5064,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=3532 /prefetch:819⤵PID:184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=4612,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=3652 /prefetch:119⤵PID:6252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --always-read-main-dll --field-trial-handle=7112,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=7100 /prefetch:119⤵PID:6180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --always-read-main-dll --field-trial-handle=7280,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=7300 /prefetch:119⤵PID:6548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=5056,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=3556 /prefetch:119⤵PID:6116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --always-read-main-dll --field-trial-handle=7532,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=7572 /prefetch:119⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --always-read-main-dll --field-trial-handle=7704,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=7732 /prefetch:119⤵PID:7336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --always-read-main-dll --field-trial-handle=7992,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=8024 /prefetch:119⤵PID:7524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --always-read-main-dll --field-trial-handle=8160,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=8152 /prefetch:119⤵PID:7584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --always-read-main-dll --field-trial-handle=7916,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=8288 /prefetch:119⤵PID:7644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --always-read-main-dll --field-trial-handle=8428,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=8264 /prefetch:119⤵PID:7724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --always-read-main-dll --field-trial-handle=8596,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=8608 /prefetch:119⤵PID:7756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --always-read-main-dll --field-trial-handle=8628,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=5696 /prefetch:119⤵PID:7912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --always-read-main-dll --field-trial-handle=7928,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=5348 /prefetch:119⤵PID:8012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --always-read-main-dll --field-trial-handle=9004,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=9028 /prefetch:119⤵PID:8060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --always-read-main-dll --field-trial-handle=8296,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=9184 /prefetch:119⤵PID:8080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --always-read-main-dll --field-trial-handle=9356,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=9344 /prefetch:119⤵PID:8188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --always-read-main-dll --field-trial-handle=9008,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=9528 /prefetch:119⤵PID:7680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --always-read-main-dll --field-trial-handle=9564,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=8600 /prefetch:119⤵PID:6284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --always-read-main-dll --field-trial-handle=8904,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=8460 /prefetch:119⤵PID:9368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --always-read-main-dll --field-trial-handle=5704,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=9152 /prefetch:119⤵PID:9376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --always-read-main-dll --field-trial-handle=6004,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=9108 /prefetch:119⤵PID:9384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --always-read-main-dll --field-trial-handle=6032,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=9112 /prefetch:119⤵PID:9396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --always-read-main-dll --field-trial-handle=5680,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=6376 /prefetch:119⤵PID:9404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --always-read-main-dll --field-trial-handle=5976,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=6396 /prefetch:119⤵PID:9412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --always-read-main-dll --field-trial-handle=3696,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=3592 /prefetch:119⤵PID:9420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --always-read-main-dll --field-trial-handle=5756,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=7000 /prefetch:119⤵PID:9428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --always-read-main-dll --field-trial-handle=5720,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=6956 /prefetch:119⤵PID:9436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --always-read-main-dll --field-trial-handle=5644,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=6936 /prefetch:119⤵PID:9448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --always-read-main-dll --field-trial-handle=5660,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=6960 /prefetch:119⤵PID:9456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --always-read-main-dll --field-trial-handle=6136,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=9552 /prefetch:119⤵PID:9464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --always-read-main-dll --field-trial-handle=6072,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=9028 /prefetch:119⤵PID:9472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --always-read-main-dll --field-trial-handle=3584,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=6444 /prefetch:119⤵PID:9480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --always-read-main-dll --field-trial-handle=5572,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=10112 /prefetch:119⤵PID:9488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --always-read-main-dll --field-trial-handle=7176,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=10132 /prefetch:119⤵PID:9496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --always-read-main-dll --field-trial-handle=9872,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=10152 /prefetch:119⤵PID:9504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --always-read-main-dll --field-trial-handle=9908,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=10172 /prefetch:119⤵PID:9512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --always-read-main-dll --field-trial-handle=9932,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=10192 /prefetch:119⤵PID:9520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=57 --always-read-main-dll --field-trial-handle=9976,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=6932 /prefetch:119⤵PID:9528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=58 --always-read-main-dll --field-trial-handle=10020,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=6848 /prefetch:119⤵PID:9536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=59 --always-read-main-dll --field-trial-handle=10040,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=6852 /prefetch:119⤵PID:9544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7436,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=10104 /prefetch:819⤵PID:9552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5520,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=7508 /prefetch:819⤵PID:9560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6252,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=7444 /prefetch:819⤵PID:9568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=64 --always-read-main-dll --field-trial-handle=7352,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=11964 /prefetch:119⤵PID:10916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=13248,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=13276 /prefetch:819⤵
- Modifies registry class
PID:10192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=13464,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=13424 /prefetch:819⤵PID:11716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=688,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=13416 /prefetch:819⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=13456,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=13404 /prefetch:819⤵PID:8480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=9044,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=7880 /prefetch:819⤵PID:7728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=4112,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=7984 /prefetch:219⤵PID:11136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=9044,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=7880 /prefetch:819⤵PID:10572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=11576,i,15132287691300290651,16774784418483986943,262144 --variations-seed-version --mojo-platform-channel-handle=11624 /prefetch:819⤵PID:6296
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:0017⤵PID:6836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k17⤵PID:1628
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:0016⤵
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k16⤵PID:6848
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:0015⤵
- Suspicious use of AdjustPrivilegeToken
PID:5480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k15⤵PID:4884
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:0014⤵
- Suspicious use of AdjustPrivilegeToken
PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k14⤵PID:3516
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:0013⤵
- Suspicious use of AdjustPrivilegeToken
PID:5248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k13⤵PID:6728
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:0012⤵
- Suspicious use of AdjustPrivilegeToken
PID:5716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k12⤵PID:7948
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:0011⤵
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k11⤵PID:7872
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:0010⤵
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k10⤵PID:6440
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:009⤵
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k9⤵PID:6252
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:008⤵
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k8⤵PID:7452
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:007⤵
- Suspicious use of AdjustPrivilegeToken
PID:5592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k7⤵PID:6292
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:006⤵
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k6⤵PID:5360
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:005⤵
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k5⤵PID:6752
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c time 00:004⤵
- Suspicious use of AdjustPrivilegeToken
PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://youtu.be/o-YBDTqX_ZU?si=KI64texgPjTiIt1k4⤵PID:7608
-
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" C:\Windows\advapi32_ext.vbs3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5536 -
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM powershell.exe /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5672
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM taskmgr.exe /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM cmd.exe /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM regedit.exe /F4⤵
- Kills process with taskkill
PID:760
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM control.exe /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM gp.exe /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM msconfig.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4476
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM MsMpEng.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:300
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avp.exe /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM AvastSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avgsvc.exe /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5208
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avc.exe /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2028 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5308
-
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM NortonSecurity.exe /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3276
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM Protegent.exe /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:6048
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM pavsrvx.exe /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:6572
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM mbam.exe /F4⤵
- Suspicious use of AdjustPrivilegeToken
PID:6164 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2744
-
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avguard.exe /F4⤵PID:7116
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM mcshield.exe /F4⤵
- Kills process with taskkill
PID:8892
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM powershell.exe /F4⤵PID:10660
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM taskmgr.exe /F4⤵
- Kills process with taskkill
PID:11080
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM cmd.exe /F4⤵PID:11188
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM regedit.exe /F4⤵
- Kills process with taskkill
PID:3820
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM control.exe /F4⤵PID:3624
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM gp.exe /F4⤵
- Kills process with taskkill
PID:716
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM msconfig.exe /F4⤵
- Kills process with taskkill
PID:11408
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM MsMpEng.exe /F4⤵PID:11568
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avp.exe /F4⤵
- Kills process with taskkill
PID:11704
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM AvastSvc.exe /F4⤵
- Kills process with taskkill
PID:11868
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avgsvc.exe /F4⤵PID:12104
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avc.exe /F4⤵
- Kills process with taskkill
PID:12284
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM NortonSecurity.exe /F4⤵
- Kills process with taskkill
PID:11504
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM Protegent.exe /F4⤵PID:7628
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM pavsrvx.exe /F4⤵PID:12076
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM mbam.exe /F4⤵PID:11840
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avguard.exe /F4⤵PID:12036
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM mcshield.exe /F4⤵PID:7628
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM powershell.exe /F4⤵PID:9424
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM taskmgr.exe /F4⤵
- Kills process with taskkill
PID:9724
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM cmd.exe /F4⤵PID:9456
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM regedit.exe /F4⤵PID:6372
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM control.exe /F4⤵
- Kills process with taskkill
PID:7824
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM gp.exe /F4⤵
- Kills process with taskkill
PID:12292
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM msconfig.exe /F4⤵PID:7972
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM MsMpEng.exe /F4⤵
- Kills process with taskkill
PID:11496
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avp.exe /F4⤵PID:780
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6316
-
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM AvastSvc.exe /F4⤵
- Kills process with taskkill
PID:8580
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avgsvc.exe /F4⤵PID:6608
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avc.exe /F4⤵
- Kills process with taskkill
PID:7252
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM NortonSecurity.exe /F4⤵PID:7280
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM Protegent.exe /F4⤵PID:12616
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM pavsrvx.exe /F4⤵PID:12800
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM mbam.exe /F4⤵
- Kills process with taskkill
PID:6248
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avguard.exe /F4⤵
- Kills process with taskkill
PID:8140
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM mcshield.exe /F4⤵
- Kills process with taskkill
PID:5424
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM powershell.exe /F4⤵PID:9916
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM taskmgr.exe /F4⤵PID:10096
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM cmd.exe /F4⤵PID:13140
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM regedit.exe /F4⤵PID:13276
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM control.exe /F4⤵PID:7848
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM gp.exe /F4⤵PID:7340
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6440
-
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM msconfig.exe /F4⤵PID:7828
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM MsMpEng.exe /F4⤵PID:13016
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avp.exe /F4⤵PID:8916
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM AvastSvc.exe /F4⤵PID:7688
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avgsvc.exe /F4⤵
- Kills process with taskkill
PID:7184
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avc.exe /F4⤵PID:5208
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM NortonSecurity.exe /F4⤵PID:7352
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM Protegent.exe /F4⤵
- Kills process with taskkill
PID:4968
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM pavsrvx.exe /F4⤵
- Kills process with taskkill
PID:11080
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM mbam.exe /F4⤵PID:12628
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avguard.exe /F4⤵PID:7592
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM mcshield.exe /F4⤵
- Kills process with taskkill
PID:4880
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM powershell.exe /F4⤵
- Kills process with taskkill
PID:4552
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM taskmgr.exe /F4⤵PID:4372
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM cmd.exe /F4⤵
- Kills process with taskkill
PID:2036
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM regedit.exe /F4⤵PID:5572
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM control.exe /F4⤵PID:7132
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM gp.exe /F4⤵PID:12468
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM msconfig.exe /F4⤵
- Kills process with taskkill
PID:7076
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM MsMpEng.exe /F4⤵PID:8240
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avp.exe /F4⤵PID:8448
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM AvastSvc.exe /F4⤵PID:8420
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avgsvc.exe /F4⤵PID:9900
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avc.exe /F4⤵
- Kills process with taskkill
PID:10096
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM NortonSecurity.exe /F4⤵
- Kills process with taskkill
PID:13240
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM Protegent.exe /F4⤵PID:12148
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM pavsrvx.exe /F4⤵
- Kills process with taskkill
PID:11192
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM mbam.exe /F4⤵
- Kills process with taskkill
PID:7868
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avguard.exe /F4⤵PID:13016
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM mcshield.exe /F4⤵PID:7664
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM powershell.exe /F4⤵PID:7688
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM taskmgr.exe /F4⤵PID:12164
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM cmd.exe /F4⤵PID:7504
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM regedit.exe /F4⤵PID:6728
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM control.exe /F4⤵PID:12176
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM gp.exe /F4⤵PID:6784
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM msconfig.exe /F4⤵
- Kills process with taskkill
PID:6204
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM MsMpEng.exe /F4⤵PID:7264
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:11080
-
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avp.exe /F4⤵
- Kills process with taskkill
PID:7548
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM AvastSvc.exe /F4⤵PID:3484
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avgsvc.exe /F4⤵
- Kills process with taskkill
PID:12800
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avc.exe /F4⤵PID:4548
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM NortonSecurity.exe /F4⤵PID:1452
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM Protegent.exe /F4⤵PID:9372
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM pavsrvx.exe /F4⤵
- Kills process with taskkill
PID:384
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM mbam.exe /F4⤵
- Kills process with taskkill
PID:10564
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avguard.exe /F4⤵
- Kills process with taskkill
PID:9436
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM mcshield.exe /F4⤵PID:1332
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:7584
-
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM powershell.exe /F4⤵
- Kills process with taskkill
PID:9176
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM taskmgr.exe /F4⤵PID:2240
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM cmd.exe /F4⤵
- Kills process with taskkill
PID:11700
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM regedit.exe /F4⤵
- Kills process with taskkill
PID:10172
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM control.exe /F4⤵PID:9596
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM gp.exe /F4⤵PID:2300
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM msconfig.exe /F4⤵
- Kills process with taskkill
PID:8548
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM MsMpEng.exe /F4⤵PID:4388
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avp.exe /F4⤵PID:9408
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM AvastSvc.exe /F4⤵PID:9704
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avgsvc.exe /F4⤵PID:3464
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avc.exe /F4⤵PID:10096
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM NortonSecurity.exe /F4⤵PID:6192
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM Protegent.exe /F4⤵
- Kills process with taskkill
PID:9456
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM pavsrvx.exe /F4⤵PID:11316
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM mbam.exe /F4⤵PID:7648
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avguard.exe /F4⤵
- Kills process with taskkill
PID:7672
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM mcshield.exe /F4⤵
- Kills process with taskkill
PID:6220
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM powershell.exe /F4⤵
- Kills process with taskkill
PID:3836
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM taskmgr.exe /F4⤵PID:12036
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM cmd.exe /F4⤵PID:13172
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM regedit.exe /F4⤵
- Kills process with taskkill
PID:8124
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM control.exe /F4⤵
- Kills process with taskkill
PID:7316
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM gp.exe /F4⤵
- Kills process with taskkill
PID:5540
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM msconfig.exe /F4⤵PID:4968
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM MsMpEng.exe /F4⤵PID:7276
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avp.exe /F4⤵
- Kills process with taskkill
PID:7188
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM AvastSvc.exe /F4⤵PID:12616
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avgsvc.exe /F4⤵
- Kills process with taskkill
PID:6264
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avc.exe /F4⤵
- Kills process with taskkill
PID:7064
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM NortonSecurity.exe /F4⤵PID:4852
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM Protegent.exe /F4⤵PID:11240
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM pavsrvx.exe /F4⤵
- Kills process with taskkill
PID:5996
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM mbam.exe /F4⤵PID:5080
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avguard.exe /F4⤵
- Kills process with taskkill
PID:7728
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM mcshield.exe /F4⤵PID:10564
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM powershell.exe /F4⤵
- Kills process with taskkill
PID:13284
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM taskmgr.exe /F4⤵
- Kills process with taskkill
PID:8480
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM cmd.exe /F4⤵
- Kills process with taskkill
PID:2036
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM regedit.exe /F4⤵PID:3996
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM control.exe /F4⤵PID:3524
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM gp.exe /F4⤵PID:8792
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM msconfig.exe /F4⤵PID:748
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM MsMpEng.exe /F4⤵PID:6736
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avp.exe /F4⤵PID:4688
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM AvastSvc.exe /F4⤵PID:8508
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avgsvc.exe /F4⤵PID:8656
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avc.exe /F4⤵PID:8756
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM NortonSecurity.exe /F4⤵
- Kills process with taskkill
PID:11960
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM Protegent.exe /F4⤵PID:4524
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM pavsrvx.exe /F4⤵
- Kills process with taskkill
PID:2072
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM mbam.exe /F4⤵PID:8940
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avguard.exe /F4⤵PID:8448
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM mcshield.exe /F4⤵PID:12276
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM powershell.exe /F4⤵
- Kills process with taskkill
PID:7844
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM taskmgr.exe /F4⤵PID:6428
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:9456
-
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM cmd.exe /F4⤵PID:7668
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM regedit.exe /F4⤵
- Kills process with taskkill
PID:6168
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM control.exe /F4⤵PID:5944
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM gp.exe /F4⤵PID:11780
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM msconfig.exe /F4⤵PID:11108
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM MsMpEng.exe /F4⤵PID:10228
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avp.exe /F4⤵PID:13136
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM AvastSvc.exe /F4⤵PID:7424
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avgsvc.exe /F4⤵PID:9128
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avc.exe /F4⤵PID:5208
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM NortonSecurity.exe /F4⤵PID:7312
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM Protegent.exe /F4⤵PID:12152
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM pavsrvx.exe /F4⤵PID:12192
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM mbam.exe /F4⤵PID:7440
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avguard.exe /F4⤵PID:8380
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM mcshield.exe /F4⤵PID:4908
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM powershell.exe /F4⤵PID:5996
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM taskmgr.exe /F4⤵
- Kills process with taskkill
PID:6568
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM cmd.exe /F4⤵PID:9436
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM regedit.exe /F4⤵PID:11380
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM control.exe /F4⤵PID:292
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM gp.exe /F4⤵PID:8972
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM msconfig.exe /F4⤵PID:3560
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM MsMpEng.exe /F4⤵PID:10804
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avp.exe /F4⤵PID:5736
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM AvastSvc.exe /F4⤵PID:1784
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avgsvc.exe /F4⤵
- Kills process with taskkill
PID:6032
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM avc.exe /F4⤵PID:1772
-
-
-
C:\Windows\pei.exe"C:\Windows\pei.exe"3⤵PID:7396
-
C:\Users\Admin\AppData\Local\Temp\2899723278.exeC:\Users\Admin\AppData\Local\Temp\2899723278.exe4⤵PID:7760
-
C:\Windows\sysldrvcs.exeC:\Windows\sysldrvcs.exe5⤵PID:8160
-
C:\Users\Admin\AppData\Local\Temp\2056027289.exeC:\Users\Admin\AppData\Local\Temp\2056027289.exe6⤵PID:9912
-
C:\Users\Admin\AppData\Local\Temp\153312276.exeC:\Users\Admin\AppData\Local\Temp\153312276.exe7⤵PID:6512
-
-
C:\Users\Admin\AppData\Local\Temp\276567879.exeC:\Users\Admin\AppData\Local\Temp\276567879.exe7⤵PID:6608
-
-
C:\Users\Admin\AppData\Local\Temp\2899833645.exeC:\Users\Admin\AppData\Local\Temp\2899833645.exe7⤵PID:5340
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "MgrDrvSvc"8⤵
- Launches sc.exe
PID:12124
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "MgrDrvSvc" binpath= "C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe" start= "auto"8⤵
- Launches sc.exe
PID:7576
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog8⤵
- Launches sc.exe
PID:8144
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "MgrDrvSvc"8⤵
- Launches sc.exe
PID:2880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2991119522.exeC:\Users\Admin\AppData\Local\Temp\2991119522.exe6⤵PID:8588
-
-
C:\Users\Admin\AppData\Local\Temp\669419084.exeC:\Users\Admin\AppData\Local\Temp\669419084.exe6⤵PID:9188
-
-
-
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /F /IM explorer.exe3⤵PID:3816
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\AddFind.otf.lcryx3⤵
- Opens file in notepad (likely ransom note)
PID:8084
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\CheckpointSplit.tmp.lcryx3⤵
- Opens file in notepad (likely ransom note)
PID:12364
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\CompressPop.xlsx.lcryx3⤵
- Opens file in notepad (likely ransom note)
PID:8408
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\ConvertFromConvertTo.vb.lcryx3⤵
- Opens file in notepad (likely ransom note)
PID:13004
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\CopyReceive.bmp.lcryx3⤵
- Opens file in notepad (likely ransom note)
PID:3500
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\DebugRead.wps.lcryx3⤵
- Opens file in notepad (likely ransom note)
PID:3480
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\DisableLimit.wmv.lcryx3⤵
- Opens file in notepad (likely ransom note)
PID:11292
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\ExportShow.tif.lcryx3⤵
- Opens file in notepad (likely ransom note)
PID:9424
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\FindUnregister.xltx.lcryx3⤵
- Opens file in notepad (likely ransom note)
PID:5456
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\InvokeOut.xlsx.lcryx3⤵
- Opens file in notepad (likely ransom note)
PID:10576
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\Microsoft Edge.lnk.lcryx3⤵PID:9732
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\MoveApprove.aif.lcryx3⤵
- Opens file in notepad (likely ransom note)
PID:10000
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\OpenPublish.ps1.lcryx3⤵
- Opens file in notepad (likely ransom note)
PID:9476
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\ResizeResolve.M2V.lcryx3⤵
- Opens file in notepad (likely ransom note)
PID:12600
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\RestoreInvoke.m4v.lcryx3⤵
- Opens file in notepad (likely ransom note)
PID:12976
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\RevokeRegister.xlsx.lcryx3⤵
- Opens file in notepad (likely ransom note)
PID:13100
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\SearchConfirm.rtf.lcryx3⤵
- Opens file in notepad (likely ransom note)
PID:9832
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\SelectStart.vb.lcryx3⤵
- Opens file in notepad (likely ransom note)
PID:10028
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4540
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:4856
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:1432
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3052
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:5568
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1628
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:2304
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x39c 0x2fc1⤵PID:7708
-
C:\ProgramData\MgrDrvSvc\sysdoruhgsf.exeC:\ProgramData\MgrDrvSvc\sysdoruhgsf.exe1⤵PID:5692
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:6096
-
-
C:\Windows\system32\dwm.exedwm.exe2⤵PID:10660
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
2Service Execution
2Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
2Disable or Modify Tools
1Indicator Removal
4Clear Persistence
1File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5df2d1721cd4e4eff7049314710dc7c11
SHA1f5aed0158b2c0a00302f743841188881d811637a
SHA256ba336ffd1b01965d7ab0e5fac5415e43cb594139c76b19e4c0d9b5b3b67c1e93
SHA51211fd520176193f284563c7d050e6a7ab4e9895bac49fdc05759bab2c8a69f224858ccc784b351fc1d3ee5d39345430f9234623c9390978d7daf6a08ff5576ef4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\12c9727a-bc7f-40d3-92af-f5ccfadd380b.tmp
Filesize36KB
MD5cc3d4128535fa14bb315d8d7f7f852c6
SHA197bb92696840c33e668df07fa6e7d8709b40a174
SHA25693a4634596bf70d8829f46b28bbd0397afca6ce994856ee918a5a86be91a113f
SHA51215eeb8800f1cd7712c1f50930149c2dbadcad3be71e062c619c562df6504b2c0bc43660566427bcb3e85e558724e64c4da1bebdb29953980e4351491e4b510ec
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000001.dbtmp
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
22KB
MD5778ca3ed38e51e5d4967cd21efbdd007
SHA106e62821512a5b73931e237e35501f7722f0dbf4
SHA256b7e1bfadb8d9c061f17a7234df012df7842ab1aa8fb6f9579fa3f0a3b4a75bc0
SHA5125f6f02099ca8079305fb7e7f43ae4344d522271fe30379c0854d6a81b7d8adf408a50a4b799b5f52e6ed162ba6ce7fe97e24a2b9719df780e75683d3aa103d09
-
Filesize
51KB
MD532aaa2c79e0b335130cfb804de2d071e
SHA1fc4a04bcbdd9938aec1d53df488999d7cb8829fa
SHA256f6fb6cfd2637df7e21c4505ebdb9bc988ba9b2c9408c78bbc90d8856a916217f
SHA512c4ec33f7f1a9da6bf825aa3dc71bba3757b0e24ca0836987a22f2377f90a578c4445873e12989ccee6fe051dc455e255253edca96e1405fcde3c9ff7fba30af0
-
Filesize
247KB
MD540e9811a8168875f77a707d6da71e710
SHA12569cd0466c78adbb50a84afe72ae01ad02c973b
SHA2566706201df31ba0673e0127f2af04b452bf025fe2a97574ea187031e98b3970f6
SHA5124106c497171570a999f69ce807c9dc75fa5ca5d2fff67a4f82fc4c6531c4591e39330bd761c03249967056507249605991c7793e519c8d39a1bd2fd5d68ffca2
-
Filesize
18KB
MD58eff0b8045fd1959e117f85654ae7770
SHA1227fee13ceb7c410b5c0bb8000258b6643cb6255
SHA25689978e658e840b927dddb5cb3a835c7d8526ece79933bd9f3096b301fe1a8571
SHA5122e4fb65caab06f02e341e9ba4fb217d682338881daba3518a0df8df724e0496e1af613db8e2f65b42b9e82703ba58916b5f5abb68c807c78a88577030a6c2058
-
Filesize
34KB
MD587273d59e6afeddd59d2809c67e38936
SHA11c2105f77c4271242a96862891f59abf401175d8
SHA2564f1422524c6beecfad34ccdf4a1500b43f511099262f09dcf2658ab91cc12deb
SHA51206bb4e1532c74d9118bf6a8a2058b3c4474daa062c5e931f9a6077e31e9cd56faba4b96dacae2471303cd24f81264347c198f662c9115973bf12a830a1c52b00
-
Filesize
34KB
MD502637a323441692541aa3eefa25b6096
SHA14aa7278ff3543f958772e9a08d802d22e7ec3b7f
SHA256dd8bef0cc314a43230b8a9665b0a8111ed998cef4000ff379a167d1a90a434b3
SHA512047d19a86832f3a1b60730e5a580c8158bda0053d373a0c345bc60458457e37abbd1f3c36169374f87fe29605f2aa79992647650ebaffec572dc50d458347e33
-
Filesize
18KB
MD5115c2d84727b41da5e9b4394887a8c40
SHA144f495a7f32620e51acca2e78f7e0615cb305781
SHA256ae0e442895406e9922237108496c2cd60f4947649a826463e2da9860b5c25dd6
SHA51200402945111722b041f317b082b7103bcc470c2112d86847eac44674053fc0642c5df72015dcb57c65c4ffabb7b03ece7e5f889190f09a45cef1f3e35f830f45
-
Filesize
44KB
MD57f5054133cb8da750e1d71002a17a7dc
SHA12da067dcbdf6013940c2cd2cc6fca40aae370f8e
SHA2566d3ab5acf7f2abb0ec0da7b0a3c31895843bd67770a29a0a578c590d43d1446d
SHA5122f083fb8419f951dc1e6d5f61352ae1db7ec02eb760f154571911b8ac5d6c154b951dc2bf9d985f8eff363ce2ff65b03c593475aeafa97a14065080d99526e76
-
Filesize
309B
MD5123636a623a3624fab70aa37f82ec3be
SHA1a0fad39b46bcc508dcfdb95e9902ce0404d251de
SHA256af7d8281c98dc839d4b2aea689f68c5b1083e7182a16e99b80ea5c2ae7569f78
SHA512e65fc5a8df68219950df7bc7f3fab2337fb316366ef4cac75d6ba7aa421a2fdce7047f39331f579f755512b05077d85af3e90dd1dd190edbd2ec0458637be4f3
-
Filesize
349B
MD5d56fa8fe2a0c201a683d94aad3733874
SHA14b59e6b0010a096eb8b98d09467ab835419a23aa
SHA256784c7ec10b3c25b883c2b9fd7a5c6063fedf875ce3437d0c75e354fe26c5b2ed
SHA5127cd45517d92f59fc4887b1adf9825de36e0f15e259992b8ab81bdf8d468ecf0fd2d7bd07a6c92584d57444af8b6996b754dd62e514803218c546fef577bfd570
-
Filesize
298B
MD5c8cddbb6128d0f8e1a20a2f7c5ab7d09
SHA1408ab55d296790fc3b2ece665baf0aaffc0699db
SHA25683a41b84cabf7f1f524d176e63968fb440adf41a7cf671825b5e1b16922d9f83
SHA5126ba18161c1fad6c55f0620dec3d03c0e7251e35c25e186469acf2e87607e9eaa740871e7f52e2beb16cc354422643659fa7691d320990626300ed7533e1feb95
-
Filesize
2KB
MD5c086a18acbb1c2dd1c068ca54056d257
SHA10225688c11b000b2c987b0b9e34fdf8b3af1d0a3
SHA2561c45e9b214a3b67bee77bdfb35f2ee40998ab3394d9157e045411dc1e586f05a
SHA512ccfa089ceed7387063aaf46d937a24b8b4b6fc97203fba9222632eddf6f72867951bb812ce37af76aadbcb9dc6be630d78bf1d7c71c92d04173f13e7e9239906
-
Filesize
8.2MB
MD5e675119ef52d0eb6328b6fcedf566c5e
SHA1a9dbe4f51898fe1689a2cafa395ca0ed962d9f19
SHA256896592714cb5009c2a36064aa3247eae7a2c419eff0cf625809c1af0560a0def
SHA512dce58b76ea7d6977cab82fe9486f9daca39a319c8852b83f81fc8656f6e3609793c197e98d4f0531d2212a81767fc77c3542e59597d4cc86fc04af4a38f3cbb9
-
Filesize
322B
MD56f5c0fd3f6e6fce5d002152ae337056d
SHA134db769673c7617b9c44c74cbd1f73320fd49ff3
SHA25656b365bb7f09a3b0ff24ad2058dd9ead6145d528b10e00811250ac73a6d11a1b
SHA512810b440ff1e80e7cf5a3e90d86792fee003be786a1a9487d9611fd962303b5a490c4142620dfa228a345fd50aae05f109f776e199848233bfb7e3269653aa579
-
Filesize
1.5MB
MD5253d6eed365a611320b541cfb9317c75
SHA14a7ea41add1604d890b6d3291f25e834bb469e28
SHA2564f1e62781b16c0f441d0119565b18bd89ef6ee36a24278a001c810557b98fd4c
SHA512cd4e4d1c48e8938d9383a897c5938ca8e4cc4653d3d22f53c90b57f9ffe52ab75460a382cc30e6a9086e80f46735574e293fb0dcf2199297eec4bbb475d449e9
-
Filesize
1KB
MD59e2e461645c3e86ea2659103b5784559
SHA1569f37b85c9c95dacb148797073f5c43b5d4d9b9
SHA2560a54f5b54666ef4bb8572d3c5426c535cf4c0e810bd7980fcfd48761991fd7b4
SHA5123338701dcca8b8c80e6360376930c9ff6b2c8d5942bc7ee045f9ceab8ccef981a92363ea5ff8b96933915a0af56e849dbb456dcb7c9e3d29c0c91782398936d2
-
Filesize
279B
MD57e9b447854803e41f4afb19c2d94d072
SHA188faad77d7f5297e3c11d2fdbf435d611fa7f83f
SHA256f83492235178b82e1e1d28fd9674837a5835858f9b8127b73a0374c9467fbe33
SHA512bc9bb894bf5ba73d9b50afb257a1e70223da050225fec7f4ec57cfece95aaf969dffc479d338b98103e52f271fbb0840bf135a514206dfe336c46e03f00ee6cf
-
Filesize
75KB
MD5b93dd52876e9be9dc535facc4ad03b0e
SHA1c64879f50ee3b47b5ea84be54897fe672576bb54
SHA25678a3659e7887e24a811bea50d88eded85305eea919fd1010fd5e167dc0786f5f
SHA512f1b3209eb85f735e4d2208e82dd71243d3280d38591c3c141fff5f3bfb79fef0b09da09648864357f8ae7d2141482d1742ab4a0dd6c4799595bea09e69dab120
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD53d876995a205fcb62904ac6930dfdfe1
SHA168de9627adbc4193a369cd6d0428851f6f1ba289
SHA25666cd036fc62f17a792d4e870b296c730aadf13afd491151fce3a023f38805f54
SHA5126e650a81fa7d94104504a16c4a73f4ba8c78d8ce798a6a1d24012cb7214e2b0eb3aa689acc1dade0003ddcc3499d52deba3ae944a4b1771ccc2ba325ce6c37fd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe589323.TMP
Filesize3KB
MD5a2f5ffc74847a5a57327328c91261152
SHA16a9ac77028b1a369d743c1d9709d51e6ec7f3dbc
SHA256c9c6b1429099b3f7d2cb4df1ef530f867dbc1ea618f003c7e1b0da1c50cc8e57
SHA5124f1633cb6aad1fcd017a26fdae6dfc7700c50563aa6148ee871cec8be89d29b509b896043fabd637128998af76991180ce20f171eb84f58e15d2864cd91261da
-
Filesize
264KB
MD5ff24a1d19e828f70e66fdf9b2246859a
SHA12e1649fa3669ef77ebea881a80ded8c8ab3aa37c
SHA25607896f4f5cc80a787d289fb3615a5b3bf35a3ca53077aa78988dd3cd95928af8
SHA512b51bdbddfdc41696cc2bf17a2c8775cb81ec4e6e6ce9a2c9f76e0eb6b961653da883e28d0ada05b65aed5104c56a425019f1fe6a56b57c3185ccad3a3ad0970f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
17KB
MD5ae0ec59fbe7aa899c9646d67eefd454e
SHA1c30dc43439e500228588de272b8c532a4b45855d
SHA25651a5c78815b4c46d2d4af1be6449c93bc36681139fe513ce656ce6a54059e8f6
SHA51283098638c9f3dd233bc3d043a94d510ab521a401bd3003bdd7971037da42e4586ba57fddfa24e66351fbd964943320604f36a331da55cf4fb825da113cba2c0c
-
Filesize
18KB
MD5e9ef5a32e48879055b9874c038e40dc6
SHA14f1fa49b9eda0496d361ae5f76ada5da254e96c1
SHA256543551ca758be86aa1ed1410c01f2e656836de04b43890a90abd9e34fa1a38d5
SHA5124669e8cde8ca4c26822c1d16ea5887b76b4d73adcdc6573ea5ef5c5515fb5f10822bab5315ebae193016c2b15c87a6f8bb2c453c9663b1f38d83c99153694b11
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\15fb0a57-9c8f-4357-a8e2-dcfa96b7a89c\index-dir\temp-index
Filesize2KB
MD568eae0a4126701f43babb70d0e1caf8e
SHA10c5be60b80629cceccd167e74578f78a014555a7
SHA25621283346294012495557a1d7ed3741cd1698dd12cd127fa775d76c08afb9ab4a
SHA5126517ebff4dcdf1d1cc2953c4a685256b505841294c8ded08c2b5d3c11c59e43a8b51d293f63aad448f36772c2c533f41596887b152a795284e96900f70121c3f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\15fb0a57-9c8f-4357-a8e2-dcfa96b7a89c\index-dir\the-real-index~RFe586099.TMP
Filesize48B
MD5558070c2a64665db163b2af6c9624410
SHA1a88fed308815ff4185c6693a27ed5604c05dd774
SHA256562f21ff9616980a9c1de8db5301039a2c728f6403fa6da26e9c3cf21b3953d8
SHA512fe0b99e01fe89dd5176f49e8fd811c132447e225f4889795b937ae0377b289677d33d8bd19153fe2c0e9e33e568f6a5ccb84cf2d06f0eeaa80dc618e2269843d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize176B
MD549d5015850c71c2c83889a5de3f140b2
SHA1749591ec995ea8123994b99bfe35bf5272f0c806
SHA256d51c74eb2235aba4bb67990bfb0ccef554bb3505b6f45e0e68d88d4ddeac2783
SHA512ed3dbda83f0dcf40aa906703ed5262f3d9518022f2abe4f219676f07469ad4f4d6b21311bfac8075a7f86d747241262afff800f803fbcbfe47047b9eef13abfc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize176B
MD5bd54c2b19aa5f4fa5d1c7ac618e48d33
SHA1060262b3b1a5b4b0fa4ac25c3ec990cec3be67f4
SHA2569b27346b1c1cfaac052c1dfc44e1b79dfc4a99094217ba82a356b05aa3e41c16
SHA5128b636c21fb170add1eed5348b608ee946af554bfe8d279b67eb5adfda3d4f3028b38d4131c5f94cf92ab01a50e4b9ab5e6c5a3dc521369252c6e10bf9b88efa5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize199B
MD5919131b8c311a2026a0f7a752c775533
SHA13139d1a2993e149b70df7d3d35c2e8dbcd19a23f
SHA25608ddca70e9270741f10f46cc559de4359e2958035d21d6bed670f82ba6bb0429
SHA51237892ff298c790f3261c880c26b9be98fdf171f3feb9e6546bf66381d3043d36cb56f69e183a3f64b318deebfef3756ad6c212acf3d844dcac0ed5a397f4eab0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize193B
MD59047e87792a24594008a853b341ab285
SHA1055765b0742ab1868909428472d634436952d681
SHA256c59ba49568fbb745275f69c2e8c8bee9158789f5e3fdfe492d43d0b40047f688
SHA512699c2b95dc240d80e24e65a803bce4cd7b0806968316b643cc3f17b7cbd210d8ee9b4c6c8faa0abfa3c7ba54a63a031779b7efcd6b5cd6d18a934f23599adbf8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize112B
MD52ad4c079d5b330f75b9ad585e9bcfa28
SHA15795ea51f988d3e305e4328e7e1106b2ababc21d
SHA2565a9e1c810fd3b98123a05ce9ebf1c115879011704a390bdb5c24b5c6c1f7ed7f
SHA512a8650af4a72500755dcf4b85491a9e5e3071141dac20c3bc863c68646d58eb33390dacd5591ebba0ee483469d631042bb68eb40df2bdd5d40567ff36b058d08d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe57c534.TMP
Filesize119B
MD5d37dfa47188a55a7641a0a3216c19f52
SHA1347ecd6461a06ad185ce2855d46dcbbf9bea1c23
SHA256eb54824ead33abbda9d3393eca3f2b4dfbd8adb25eb35797228483922fa0d05b
SHA5120ce139bdb87f6045b5adb6c90ab2ba115b540471cb4cf81cad0c12d1d14c82036e82419679782984f6d4ed6430118583fe067709d803ad843e7bec81c5e693ab
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD57c8f089b967d38dc7f9687cf28f0495c
SHA1496a38ebc493e51e41594a3d4cb3e7960ba48092
SHA256743ac8516e490637de89f6a654924c590c56291b61210d78cc19b8d087db2de2
SHA5122195945b0049c42753c210fe3cd941167fd8336b9ec85b287e7d9d94d16015e8dc162ad3b8bfa72c6ce1fc04d80812f47b3b678e69e554a41f15aabe1966b8e5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58143f.TMP
Filesize72B
MD5bac417594268044e3e1afecd56fe800b
SHA1ad0f54762ef448601d56130a747c9e57c24a7f05
SHA2561b6040b2406029c97a098aa874a5528d54af55acf125b0a4777763d9b7e3ff18
SHA51219bac1a90ac54c4cfebba7553495fb851bd2d29282c1daf5241f0c56f18778f9f2904bd1bed33d442815dcd6b7aa762b40dd823d887074238c071135ed4384ff
-
Filesize
22KB
MD558979d2ddcb51f50263fc045c0c13d70
SHA1308f5772a1e9e9f7258e1f516e516d20b343b389
SHA256b3507af65f08db8ae48f2364bc903eafe8508659440b7e8f8c1b7c8022b5e8da
SHA5122e69f332cdb787f4f1c3f41df62f06dc21e45b9d2f4d22edae59825e85fa79f35a60b518adbd02ed28ba1333343776be1fde101cdfa3faadf6d9f7247dca6d67
-
Filesize
431B
MD58431e90157342e1a047dbcf186372d3b
SHA1de110c1d822b0bf30b04f0a51fd6bdeb7f4533d1
SHA256dfed758bef903629b77abf89f86357938196278f0606301c01bd9e060725edd8
SHA512b27c94929054e7306614a31cc549fc1714bf134048735b5fe334317dff13723f0279ff4eb160dbb3794a7bbb76d46e03a9a73580ed02119f53923764ce527cd6
-
Filesize
40KB
MD5716a5360cdf9fb7ea611fc6fc9619eba
SHA158141ceba2d5badf784753bead3da76f08ee0744
SHA256ca88868a5831cf6285e5bd7971c4fc265db794ba7825d14878d308b8022cf9f5
SHA512a6c9398dfb83c032b17e013e21b613de3d3924e2c21e8323d2102705809d0439b5139e6ea0398c5828e16e381221642d3d29d8aeb60fe6ac7d1a47cd4f478940
-
Filesize
40KB
MD54e318028cd42695c082bb4b79726ec14
SHA10dbd0671a0246f3b5de2d6c0f3fec898d8552b85
SHA2566990bbb6b7b8373b0217474c77b1024787fdf6800a4be89da7d6ba5185ffadd8
SHA5128930b58d3b5b917764de9e9c43291c025b05d3fb2bf978d4409357fcf6d03849bfcaf19387a52f443723fa457f290e8ca0ab2af02fdc23aa1af346a2194627bf
-
Filesize
40KB
MD52d1b450f1f5b418d7ea83eeca577ae2f
SHA1c40e4ef30ae1664eab3b7c86c47ee3a9b2eb3a5a
SHA25673d806852fcb631b9f5788042ff68224b6c9a72a336499ee12d900fe0dda1125
SHA5121e965c6c8ea201072878cd997a512a19773cfda0bb344c1aff1e93e62187b2ab31bfe983f3da5847f409c0574d69b326c0fa8c0d8c4bd8676b8680d7c8da65ef
-
Filesize
49KB
MD519f5844f4fd10ce3ef05f109705d9431
SHA1367e6c9e5fc5c02c20089295ffc9803bc9c0798b
SHA256012f085da025005aa21fd867e7f8c88470c9a236b8ef729075d6f809a0862ccc
SHA5122ea969c6c69eda929b6ceb2688e7b1a377d445cacfb648512c8af732526b27d84dad52ea4cb0c2d8cd2ebebdd0cb52f27a78bde10fd835efc7dfc4cce7440524
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5869e1ed8a530440cd776bb6d182333e8
SHA155b0c3a2a28f4f16b09aaf6608895724445d3ec7
SHA256ccb85f28bc1f2e90fa5608db5d04fe55333c3ab30a71eafbb53e75626ec88a88
SHA512d2cdc044e377a1927d09baea8eebafea03c71f5e1897b1be4c2276b18b537fc722065f2632892507c54f7a734b31b6181217b6551f72ab82010ddc9e831af30d
-
Filesize
101KB
MD58a30adfbb8c9ed8170177ce8c5738fbf
SHA12d029ddd39fe81a08982dd4309a74045aa91004f
SHA25672b19310a8c3cdfc23be1041eb773e6e41a08ec608e53b027b32e05a275b1da9
SHA5128885308b53b8d1baab14a98ec257acac9c700f2cebe48cbb79a25e3d7133f0016ba082ec9f8397c9b1677375dd5a1d3894d813aba5947f267b44b012fa6a027f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
263B
MD53ef0278e79a3b141585b0eb66d965dcd
SHA12c5a34b067b368adcb8daad4b6ead6c4a1a2ef26
SHA256defe7e5a9ae1aa925ca79cc6f7b1c56368bcf21b48668e1161449ed96bb6774a
SHA512b21fcb3dfc37680fe6669818505101fff46a0848a5406e5e94c5dbe4c6031bb47cfe4763d21fa8d966c8e09e8e5050c4e35bc1f0cfdedcb6cb63bec9db34221c
-
Filesize
57KB
MD5213d54fdd2e5ac72918077ab8069cbe1
SHA11e809abe4170d2dea23d3eb28b5bc66d98c5a891
SHA256735b228d47ceffafbc59fd43184ff892d90041cadee6483087f57e52b7ddc412
SHA512fd710b924ef633da374385df407a9438f7bf48024cd4fc4340997a4cdc1894f2f94ccb11304d73234552e392e01edec8159d5dccd6cbc3577e8cc2b2171b97c4
-
Filesize
4KB
MD5eb59ddb67b649ba0359eaf58f6f499a2
SHA1ecf724b576596308f4ffba028989f9365ea32639
SHA2560bab65343e6a50d8ca683629442a3eb1ec16c599bb2e5ae59bcbbda911878ffa
SHA5122a5c911da216cb60cbd874d29f1ea81322e0a0922cea602bcabfeefc493a23a97034fb2faae565d9fa983bd3b84031158b21238276fecb674baf72d7ba7aaa3d
-
Filesize
137B
MD5d3c8cdc769514ce85192750f1902c2ac
SHA1bebba274b8268a749dc3010700bfd762b57386f0
SHA256e69ca202d729a3a721f87fcbc4510479c59cd2423294a269204466474943725a
SHA51266b63f8af41575ac1b486735efac9155e1dfe37d83e74944ee77b8a5ec3632c3bc0a0aefa1c2fe04ccff439ee09b32ea2176bf815f84c4cc2dc90a4e953e31f0
-
Filesize
1KB
MD5f7f9da3c5b7b83cceaf4caaefaacf294
SHA1a1e8fdec05acbbee9db2f800c71c5d71fd9593d8
SHA256fa5361028ad789b0423c8528a333748e628efc214f74a89840ed678abd068f79
SHA51253ec381354624b46ae12024216e95d6303e697023d9b8e4f69c03a4dc096f6dcdad5253a5b2bdbb813b66150f132ebe9845f722f53e1f82d6bbd7e51a11dae7a
-
Filesize
1KB
MD512fab7544912da13a25635c1c2c40044
SHA135ffec9f570c66a5ad2e4c733ffec8c00c546bb4
SHA25682cdaf326f78c9ef5f6b5fd7c1307ca53efb80ea76775097cba45bfad276fa8d
SHA5128820a71932941ea55114e974702eb4459f1019f43471e8abd9b84728c57454b539147f355e825cf99977c3a0369f7531cc2362caf1ca78609fd5f057f2b6e018
-
Filesize
10KB
MD54c52cf849be8954638925c242e0cc976
SHA1949ba0061ea9dbe3b9059bb2a7b20caa74861280
SHA256fa6fcf2e154c0b18b12ab86267ccd38d79cc9c27e7e261a7e9201a0a9dd9d0bb
SHA512c11572dcd274bdcb5e94cf38ec36aa65e4d5605df250ee8887cd5098b044e3e2e71be3b3292118b967e27bc752b5cf5d9c8da5ac2834b7c156302c307abe123b
-
Filesize
1KB
MD52e307117fa5dd587ce5327e77b72547d
SHA13971c0da252fab4946cb581d8e4224ef4a470c03
SHA256aebd2d40c1457ae5508ec489138266baf1d11ebd71d87d65c52d14b488f05904
SHA51270393958cfd4ed35874f326b4c23300e663a7b29f91db7c39cd57ff79107f7800243386c853a7525d05159087114b6ee6cc5ada3895a5584a1b6b98ac0ee1482