Analysis
-
max time kernel
375s -
max time network
372s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
27/03/2025, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
Oneclick-V7.0.bat
Resource
win10ltsc2021-20250314-en
General
-
Target
Oneclick-V7.0.bat
-
Size
201KB
-
MD5
c8e2a0c12285b709fc839a4c7cbd6e1a
-
SHA1
cae0726adbd932745e4e4db37c82c5839f632efa
-
SHA256
67b5e27f2726692662d746c555d403d35293c6bf6eb0f5d8beaba417872a5d9c
-
SHA512
a99ca57c12ab00bd160747812ef71518cff0db5b8962b6b21694f0e9d7682830642290c8cbef7a83368ea7b302730e3d0930761edae15fca51247ee8f14bdc18
-
SSDEEP
1536:8PSPKdigMQgPTjIV4QJ8STaggyjH/nvfHH4pXfCWOBEzCLiD15ToSmcj/DB:MfjvvfeTTmcTDB
Malware Config
Signatures
-
Disables service(s) 3 TTPs
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" OOSU10.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "0" reg.exe -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 3316 bcdedit.exe 4540 Process not Found 5360 Process not Found 1168 Process not Found -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\Software\Microsoft\Active Setup\Installed Components Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\Software\Microsoft\Active Setup\Installed Components Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\Software\Microsoft\Active Setup\Installed Components Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\Software\Microsoft\Active Setup\Installed Components Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\Software\Microsoft\Active Setup\Installed Components Process not Found -
Command and Scripting Interpreter: PowerShell 1 TTPs 64 IoCs
Run Powershell and hide display window.
pid Process 2116 powershell.exe 4816 powershell.exe 4820 Process not Found 1704 Process not Found 2404 powershell.exe 2628 powershell.exe 4484 Process not Found 2864 Process not Found 760 Process not Found 2360 Process not Found 4052 Process not Found 4444 Process not Found 3804 powershell.exe 1616 powershell.exe 832 powershell.exe 2012 Process not Found 5040 Process not Found 4600 Process not Found 5464 Process not Found 5792 Process not Found 5136 Process not Found 4296 Process not Found 6084 Process not Found 3972 Process not Found 1404 Process not Found 5692 Process not Found 3704 Process not Found 5328 Process not Found 4220 Process not Found 3512 Process not Found 3344 Process not Found 1244 powershell.exe 5096 Process not Found 4968 Process not Found 1588 Process not Found 4824 Process not Found 3764 powershell.exe 2600 Process not Found 5832 Process not Found 4436 Process not Found 5680 Process not Found 3108 powershell.exe 4148 powershell.exe 5852 Process not Found 5964 Process not Found 716 Process not Found 380 powershell.exe 2292 Process not Found 3716 Process not Found 5396 Process not Found 3776 Process not Found 4776 Process not Found 4052 powershell.exe 6104 Process not Found 4964 Process not Found 4636 Process not Found 2140 Process not Found 4592 Process not Found 2908 Process not Found 5860 Process not Found 3692 Process not Found 5688 Process not Found 1344 powershell.exe 452 powershell.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lsass.exe\PerfOptions\CpuPriorityClass = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lsass.exe\PerfOptions\IoPriority = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\svchost.exe\PerfOptions reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\svchost.exe\PerfOptions\IoPriority = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrustedInstaller.exe\PerfOptions reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrustedInstaller.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dwm.exe\PerfOptions reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\PerfOptions reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\PerfOptions\CpuPriorityClass = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vlc.exe\PerfOptions\CpuPriorityClass = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dwm.exe reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\csrss.exe\PerfOptions\CpuPriorityClass = "4" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lsass.exe\PerfOptions reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smss.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wininit.exe reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WMIADAP.exe\PerfOptions\CpuPriorityClass = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ApplicationFrameHost.exe\PerfOptions\CpuPriorityClass = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wuauclt.exe\PerfOptions reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lsass.exe\PerfOptions\PagePriority = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wuauclt.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SearchIndexer.exe\PerfOptions reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wuauclt.exe\PerfOptions reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dwm.exe\PerfOptions\CpuPriorityClass = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smss.exe\PerfOptions\CpuPriorityClass = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\svchost.exe\PerfOptions reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dwm.exe\PerfOptions\IoPriority = "3" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lsass.exe\PerfOptions reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\services.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sihost.exe\PerfOptions reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sihost.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\svchost.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe\PerfOptions reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fontdrvhost.exe\PerfOptions reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fontdrvhost.exe reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fontdrvhost.exe\PerfOptions\CpuPriorityClass = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lsass.exe\PerfOptions reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sihost.exe\PerfOptions\CpuPriorityClass = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\StartMenu.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ApplicationFrameHost.exe\PerfOptions reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\csrss.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dllhost.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\services.exe\PerfOptions reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrustedInstaller.exe\PerfOptions\CpuPriorityClass = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WMIADAP.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SearchIndexer.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vlc.exe\PerfOptions reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe\PerfOptions\CpuPriorityClass = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ApplicationFrameHost.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\csrss.exe\PerfOptions reg.exe -
Possible privilege escalation attempt 11 IoCs
pid Process 5512 takeown.exe 3876 icacls.exe 3180 takeown.exe 4708 icacls.exe 2656 icacls.exe 4744 takeown.exe 3148 icacls.exe 3168 takeown.exe 2752 icacls.exe 3668 takeown.exe 4400 icacls.exe -
Stops running service(s) 4 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\Control Panel\International\Geo\Nation cmd.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 4 IoCs
pid Process 1100 OOSU10.exe 64 NSudoLG.exe 60 NSudoLG.exe 1228 NSudoLG.exe -
Modifies file permissions 1 TTPs 11 IoCs
pid Process 3168 takeown.exe 2752 icacls.exe 3180 takeown.exe 3668 takeown.exe 2656 icacls.exe 4400 icacls.exe 5512 takeown.exe 3148 icacls.exe 4708 icacls.exe 4744 takeown.exe 3876 icacls.exe -
Enumerates connected drives 3 TTPs 16 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\E: Process not Found File opened (read-only) \??\E: explorer.exe File opened (read-only) \??\E: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\E: Process not Found File opened (read-only) \??\E: Process not Found File opened (read-only) \??\F: Process not Found File opened (read-only) \??\F: Process not Found File opened (read-only) \??\F: Process not Found File opened (read-only) \??\E: Process not Found File opened (read-only) \??\F: Process not Found File opened (read-only) \??\E: Process not Found File opened (read-only) \??\F: Process not Found File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\E: explorer.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 37 raw.githubusercontent.com 38 raw.githubusercontent.com -
Power Settings 1 TTPs 10 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 1892 Process not Found 4484 Process not Found 5376 powercfg.exe 4488 Process not Found 3992 Process not Found 6004 Process not Found 4668 Process not Found 1168 Process not Found 2096 Process not Found 2268 Process not Found -
Hide Artifacts: Ignore Process Interrupts 1 TTPs 2 IoCs
Command interpreters often include specific commands/flags that ignore errors and other hangups.
pid Process 1336 powershell.exe 5868 powershell.exe -
Launches sc.exe 64 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2104 sc.exe 1932 sc.exe 5384 sc.exe 6132 sc.exe 2456 sc.exe 5368 sc.exe 4516 sc.exe 6012 sc.exe 5960 sc.exe 4812 sc.exe 3828 sc.exe 1176 sc.exe 1680 sc.exe 4468 sc.exe 5764 sc.exe 3488 sc.exe 5396 sc.exe 4076 sc.exe 5352 sc.exe 2460 sc.exe 1392 sc.exe 4380 sc.exe 1644 sc.exe 5284 sc.exe 3516 sc.exe 1244 sc.exe 3700 sc.exe 3328 sc.exe 3084 sc.exe 5928 sc.exe 5384 sc.exe 2240 sc.exe 3396 sc.exe 5832 sc.exe 5188 sc.exe 4400 sc.exe 4640 sc.exe 3068 sc.exe 3684 sc.exe 5224 sc.exe 4200 sc.exe 2272 sc.exe 4364 sc.exe 3876 sc.exe 1872 sc.exe 3884 sc.exe 832 sc.exe 4556 sc.exe 3720 sc.exe 5040 sc.exe 2272 sc.exe 5696 sc.exe 1348 sc.exe 3356 sc.exe 4296 sc.exe 1808 sc.exe 628 sc.exe 2636 sc.exe 4140 sc.exe 4400 sc.exe 3340 sc.exe 5396 sc.exe 4776 sc.exe 384 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Capabilities Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A Process not Found Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Process not Found -
Delays execution with timeout.exe 64 IoCs
pid Process 6084 Process not Found 2636 timeout.exe 1172 timeout.exe 3300 Process not Found 4464 Process not Found 4516 timeout.exe 60 timeout.exe 4712 timeout.exe 648 timeout.exe 2052 timeout.exe 5292 timeout.exe 1432 Process not Found 4908 Process not Found 4312 timeout.exe 4544 timeout.exe 6080 timeout.exe 1352 timeout.exe 5308 timeout.exe 1144 Process not Found 2696 Process not Found 3316 timeout.exe 2104 timeout.exe 1432 timeout.exe 5488 timeout.exe 5816 timeout.exe 4984 timeout.exe 5396 timeout.exe 1768 timeout.exe 4372 timeout.exe 3632 Process not Found 5716 timeout.exe 2412 timeout.exe 4972 timeout.exe 1476 timeout.exe 3788 timeout.exe 2736 timeout.exe 4808 timeout.exe 5688 timeout.exe 4636 timeout.exe 2952 timeout.exe 3148 Process not Found 4748 Process not Found 2660 timeout.exe 3768 timeout.exe 3252 timeout.exe 888 timeout.exe 3860 timeout.exe 4644 timeout.exe 2552 timeout.exe 2248 timeout.exe 4232 timeout.exe 6060 timeout.exe 4488 timeout.exe 2460 timeout.exe 3772 timeout.exe 5832 timeout.exe 5096 timeout.exe 664 timeout.exe 2696 Process not Found 4076 timeout.exe 5868 timeout.exe 2148 timeout.exe 3980 Process not Found 3388 timeout.exe -
Disables Windows logging functionality 2 TTPs
Changes registry settings to disable Windows Event logging.
-
Kills process with taskkill 19 IoCs
pid Process 5408 taskkill.exe 4964 taskkill.exe 564 taskkill.exe 5904 taskkill.exe 3164 taskkill.exe 2008 taskkill.exe 5664 taskkill.exe 5784 taskkill.exe 4604 taskkill.exe 3880 Process not Found 2868 taskkill.exe 5488 taskkill.exe 1212 taskkill.exe 5752 Process not Found 3760 Process not Found 5180 taskkill.exe 4900 taskkill.exe 4400 Process not Found 3932 Process not Found -
Modifies Control Panel 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\Control Panel\International\User Profile\HttpAcceptLanguageOptOut = "1" OOSU10.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\SOFTWARE\Microsoft\Internet Explorer\GPU Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\Software\Microsoft\Internet Explorer\Toolbar Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\Software\Microsoft\Internet Explorer\GPU Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\SOFTWARE\Microsoft\Internet Explorer\GPU Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\Software\Microsoft\Internet Explorer\GPU Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\Software\Microsoft\Internet Explorer\GPU Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\SOFTWARE\Microsoft\Internet Explorer\GPU Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\Software\Microsoft\Internet Explorer\GPU Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\SOFTWARE\Microsoft\Internet Explorer\GPU Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\Software\Microsoft\Internet Explorer\GPU Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\SOFTWARE\Microsoft\Internet Explorer\GPU Process not Found -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Keyboard reg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Control Panel\Keyboard\InitialKeyboardIndicators = "80000002" reg.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Anywhere;Trailing" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Microsoft Cosimo" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel\HotKey = "0" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000010000001800000030f125b7ef471a10a5f102608c9eebac0a000000a0000000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Discrete;Continuous" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Microsoft Hedda - German (Germany)" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "1" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Microsoft Speech HW Voice Activation - Japanese (Japan)" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = 49553b76dbc112bcd96e2ce32f82aa3750d88abb05779f5fac65e84c5363077e SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "407" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "{0B3398EA-00F1-418b-AA31-6F2F9BE5809B}" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "11.0.2013.1022" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "56" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "%windir%\\Speech_OneCore\\Engines\\SR\\it-IT-N\\c1040.fe" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "40C" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "40A;C0A" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Adult" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "%windir%\\System32\\Speech_OneCore\\VoiceActivation\\it-IT\\VoiceActivation_HW_it-IT.dat" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge OOSU10.exe Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "MS-3082-110-WINMO-DNN" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "56" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "HKEY_LOCAL_MACHINE/SOFTWARE\\Microsoft\\Speech_OneCore\\AudioOutput\\TokenEnums\\MMAudioOut\\" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "- 0001 ! 0002 & 0003 , 0004 . 0005 ? 0006 _ 0007 1 0008 ~ 0009 aa 000a a 000b oh 000c ax 000d b 000e d 000f eh 0010 ey 0011 f 0012 g 0013 hy 0014 uy 0015 iy 0016 k 0017 l 0018 m 0019 n 001a ng 001b nj 001c oe 001d eu 001e ow 001f p 0020 r 0021 s 0022 sh 0023 t 0024 uw 0025 v 0026 w 0027 y 0028 z 0029 zh 002a" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\CLSID powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "MS-1040-110-WINMO-DNN" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Microsoft Haruka" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "23" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\NodeSlot = "2" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "%windir%\\Speech_OneCore\\Engines\\SR\\en-US-N\\tn1033.bin" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "%windir%\\System32\\Speech_OneCore\\VoiceActivation\\ja-JP\\sidubm.table" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "%windir%\\Speech_OneCore\\Engines\\SR\\en-US-N\\r1033sr.lxa" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "%windir%\\Speech_OneCore\\Engines\\TTS\\en-US\\MSTTSLocenUS.dat" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "%windir%\\System32\\Speech_OneCore\\VoiceActivation\\en-US\\VoiceActivation_HW_en-US.dat" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\MuiCache Process not Found Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "- 0001 ! 0002 & 0003 , 0004 . 0005 ? 0006 _ 0007 + 0008 * 0009 1 000A 2 000B 3 000C 4 000D 5 000E a 000F ai 0010 an 0011 ang 0012 ao 0013 ba 0014 bai 0015 ban 0016 bang 0017 bao 0018 bei 0019 ben 001A beng 001B bi 001C bian 001D biao 001E bie 001F bin 0020 bing 0021 bo 0022 bu 0023 ca 0024 cai 0025 can 0026 cang 0027 cao 0028 ce 0029 cen 002A ceng 002B cha 002C chai 002D chan 002E chang 002F chao 0030 che 0031 chen 0032 cheng 0033 chi 0034 chong 0035 chou 0036 chu 0037 chuai 0038 chuan 0039 chuang 003A chui 003B chun 003C chuo 003D ci 003E cong 003F cou 0040 cu 0041 cuan 0042 cui 0043 cun 0044 cuo 0045 da 0046 dai 0047 dan 0048 dang 0049 dao 004A de 004B dei 004C den 004D deng 004E di 004F dia 0050 dian 0051 diao 0052 die 0053 ding 0054 diu 0055 dong 0056 dou 0057 du 0058 duan 0059 dui 005A dun 005B duo 005C e 005D ei 005E en 005F er 0060 fa 0061 fan 0062 fang 0063 fei 0064 fen 0065 feng 0066 fo 0067 fou 0068 fu 0069 ga 006A gai 006B gan 006C gang 006D gao 006E ge 006F gei 0070 gen 0071 geng 0072 gong 0073 gou 0074 gu 0075 gua 0076 guai 0077 guan 0078 guang 0079 gui 007A gun 007B guo 007C ha 007D hai 007E han 007F hang 0080 hao 0081 he 0082 hei 0083 hen 0084 heng 0085 hong 0086 hou 0087 hu 0088 hua 0089 huai 008A huan 008B huang 008C hui 008D hun 008E huo 008F ji 0090 jia 0091 jian 0092 jiang 0093 jiao 0094 jie 0095 jin 0096 jing 0097 jiong 0098 jiu 0099 ju 009A juan 009B jue 009C jun 009D ka 009E kai 009F kan 00A0 kang 00A1 kao 00A2 ke 00A3 kei 00A4 ken 00A5 keng 00A6 kong 00A7 kou 00A8 ku 00A9 kua 00AA kuai 00AB kuan 00AC kuang 00AD kui 00AE kun 00AF kuo 00B0 la 00B1 lai 00B2 lan 00B3 lang 00B4 lao 00B5 le 00B6 lei 00B7 leng 00B8 li 00B9 lia 00BA lian 00BB liang 00BC liao 00BD lie 00BE lin 00BF ling 00C0 liu 00C1 lo 00C2 long 00C3 lou 00C4 lu 00C5 luan 00C6 lue 00C7 lun 00C8 luo 00C9 lv 00CA ma 00CB mai 00CC man 00CD mang 00CE mao 00CF me 00D0 mei 00D1 men 00D2 meng 00D3 mi 00D4 mian 00D5 miao 00D6 mie 00D7 min 00D8 ming 00D9 miu 00DA mo 00DB mou 00DC mu 00DD na 00DE nai 00DF nan 00E0 nang 00E1 nao 00E2 ne 00E3 nei 00E4 nen 00E5 neng 00E6 ni 00E7 nian 00E8 niang 00E9 niao 00EA nie 00EB nin 00EC ning 00ED niu 00EE nong 00EF nou 00F0 nu 00F1 nuan 00F2 nue 00F3 nuo 00F4 nv 00F5 o 00F6 ou 00F7 pa 00F8 pai 00F9 pan 00FA pang 00FB pao 00FC pei 00FD pen 00FE peng 00FF pi 0100 pian 0101 piao 0102 pie 0103 pin 0104 ping 0105 po 0106 pou 0107 pu 0108 qi 0109 qia 010A qian 010B qiang 010C qiao 010D qie 010E qin 010F qing 0110 qiong 0111 qiu 0112 qu 0113 quan 0114 que 0115 qun 0116 ran 0117 rang 0118 rao 0119 re 011A ren 011B reng 011C ri 011D rong 011E rou 011F ru 0120 ruan 0121 rui 0122 run 0123 ruo 0124 sa 0125 sai 0126 san 0127 sang 0128 sao 0129 se 012A sen 012B seng 012C sha 012D shai 012E shan 012F shang 0130 shao 0131 she 0132 shei 0133 shen 0134 sheng 0135 shi 0136 shou 0137 shu 0138 shua 0139 shuai 013A shuan 013B shuang 013C shui 013D shun 013E shuo 013F si 0140 song 0141 sou 0142 su 0143 suan 0144 sui 0145 sun 0146 suo 0147 ta 0148 tai 0149 tan 014A tang 014B tao 014C te 014D tei 014E teng 014F ti 0150 tian 0151 tiao 0152 tie 0153 ting 0154 tong 0155 tou 0156 tu 0157 tuan 0158 tui 0159 tun 015A tuo 015B wa 015C wai 015D wan 015E wang 015F wei 0160 wen 0161 weng 0162 wo 0163 wu 0164 xi 0165 xia 0166 xian 0167 xiang 0168 xiao 0169 xie 016A xin 016B xing 016C xiong 016D xiu 016E xu 016F xuan 0170 xue 0171 xun 0172 ya 0173 yan 0174 yang 0175 yao 0176 ye 0177 yi 0178 yin 0179 ying 017A yo 017B yong 017C you 017D yu 017E yuan 017F yue 0180 yun 0181 za 0182 zai 0183 zan 0184 zang 0185 zao 0186 ze 0187 zei 0188 zen 0189 zeng 018A zha 018B zhai 018C zhan 018D zhang 018E zhao 018F zhe 0190 zhei 0191 zhen 0192 zheng 0193 zhi 0194 zhong 0195 zhou 0196 zhu 0197 zhua 0198 zhuai 0199 zhuan 019A zhuang 019B zhui 019C zhun 019D zhuo 019E zi 019F zong 01A0 zou 01A1 zu 01A2 zuan 01A3 zui 01A4 zun 01A5 zuo 01A6" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "{06405088-BC01-4E08-B392-5303E75090C8}" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "%windir%\\Speech_OneCore\\Engines\\SR\\en-US-N\\L1033" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "{0CFAE939-931E-4305-8D05-8C76C254EB34}" SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-809364120-1453366396-340093129-1000\{F38492F4-A979-469F-8F6B-F16E1809D5E8} Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "0" SearchApp.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 5356 reg.exe -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 6056 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2540 powershell.exe 2540 powershell.exe 640 powershell.exe 640 powershell.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 408 powershell.exe 408 powershell.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3164 powershell.exe 3628 taskmgr.exe 3164 powershell.exe 3628 taskmgr.exe 3832 powershell.exe 3832 powershell.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 1336 powershell.exe 1336 powershell.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 5264 powershell.exe 5264 powershell.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 2520 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3516 Process not Found 5556 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2540 powershell.exe Token: SeDebugPrivilege 640 powershell.exe Token: SeDebugPrivilege 3628 taskmgr.exe Token: SeSystemProfilePrivilege 3628 taskmgr.exe Token: SeCreateGlobalPrivilege 3628 taskmgr.exe Token: SeDebugPrivilege 408 powershell.exe Token: SeDebugPrivilege 3164 powershell.exe Token: SeDebugPrivilege 3832 powershell.exe Token: SeBackupPrivilege 2692 vssvc.exe Token: SeRestorePrivilege 2692 vssvc.exe Token: SeAuditPrivilege 2692 vssvc.exe Token: SeDebugPrivilege 1336 powershell.exe Token: SeDebugPrivilege 5264 powershell.exe Token: SeBackupPrivilege 1712 srtasks.exe Token: SeRestorePrivilege 1712 srtasks.exe Token: SeSecurityPrivilege 1712 srtasks.exe Token: SeTakeOwnershipPrivilege 1712 srtasks.exe Token: SeBackupPrivilege 1712 srtasks.exe Token: SeRestorePrivilege 1712 srtasks.exe Token: SeSecurityPrivilege 1712 srtasks.exe Token: SeTakeOwnershipPrivilege 1712 srtasks.exe Token: SeDebugPrivilege 2520 powershell.exe Token: SeShutdownPrivilege 5376 powercfg.exe Token: SeCreatePagefilePrivilege 5376 powercfg.exe Token: SeShutdownPrivilege 5376 powercfg.exe Token: SeCreatePagefilePrivilege 5376 powercfg.exe Token: SeDebugPrivilege 3484 powershell.exe Token: SeIncreaseQuotaPrivilege 3484 powershell.exe Token: SeSecurityPrivilege 3484 powershell.exe Token: SeTakeOwnershipPrivilege 3484 powershell.exe Token: SeLoadDriverPrivilege 3484 powershell.exe Token: SeSystemProfilePrivilege 3484 powershell.exe Token: SeSystemtimePrivilege 3484 powershell.exe Token: SeProfSingleProcessPrivilege 3484 powershell.exe Token: SeIncBasePriorityPrivilege 3484 powershell.exe Token: SeCreatePagefilePrivilege 3484 powershell.exe Token: SeBackupPrivilege 3484 powershell.exe Token: SeRestorePrivilege 3484 powershell.exe Token: SeShutdownPrivilege 3484 powershell.exe Token: SeDebugPrivilege 3484 powershell.exe Token: SeSystemEnvironmentPrivilege 3484 powershell.exe Token: SeRemoteShutdownPrivilege 3484 powershell.exe Token: SeUndockPrivilege 3484 powershell.exe Token: SeManageVolumePrivilege 3484 powershell.exe Token: 33 3484 powershell.exe Token: 34 3484 powershell.exe Token: 35 3484 powershell.exe Token: 36 3484 powershell.exe Token: SeDebugPrivilege 2116 powershell.exe Token: SeDebugPrivilege 5408 taskkill.exe Token: SeDebugPrivilege 5868 powershell.exe Token: SeDebugPrivilege 3992 powershell.exe Token: SeIncreaseQuotaPrivilege 3992 powershell.exe Token: SeSecurityPrivilege 3992 powershell.exe Token: SeTakeOwnershipPrivilege 3992 powershell.exe Token: SeLoadDriverPrivilege 3992 powershell.exe Token: SeSystemProfilePrivilege 3992 powershell.exe Token: SeSystemtimePrivilege 3992 powershell.exe Token: SeProfSingleProcessPrivilege 3992 powershell.exe Token: SeIncBasePriorityPrivilege 3992 powershell.exe Token: SeCreatePagefilePrivilege 3992 powershell.exe Token: SeBackupPrivilege 3992 powershell.exe Token: SeRestorePrivilege 3992 powershell.exe Token: SeShutdownPrivilege 3992 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe 3628 taskmgr.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
pid Process 232 StartMenuExperienceHost.exe 756 TextInputHost.exe 756 TextInputHost.exe 2604 SearchApp.exe 3344 TextInputHost.exe 3712 StartMenuExperienceHost.exe 3344 TextInputHost.exe 2480 SearchApp.exe 6088 StartMenuExperienceHost.exe 5800 TextInputHost.exe 5800 TextInputHost.exe 2360 SearchApp.exe 6104 explorer.exe 4896 Process not Found 5320 Process not Found 5320 Process not Found 3748 Process not Found 3544 Process not Found 4168 Process not Found 400 Process not Found 4168 Process not Found 4928 Process not Found 4852 Process not Found 3532 Process not Found 3532 Process not Found 664 Process not Found 5056 Process not Found 2404 Process not Found 4216 Process not Found 2404 Process not Found 2036 Process not Found 3516 Process not Found 3216 Process not Found 5116 Process not Found 3216 Process not Found 3592 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4764 wrote to memory of 600 4764 cmd.exe 83 PID 4764 wrote to memory of 600 4764 cmd.exe 83 PID 4764 wrote to memory of 2500 4764 cmd.exe 84 PID 4764 wrote to memory of 2500 4764 cmd.exe 84 PID 2500 wrote to memory of 2820 2500 cmd.exe 85 PID 2500 wrote to memory of 2820 2500 cmd.exe 85 PID 2500 wrote to memory of 4744 2500 cmd.exe 86 PID 2500 wrote to memory of 4744 2500 cmd.exe 86 PID 4764 wrote to memory of 2540 4764 cmd.exe 87 PID 4764 wrote to memory of 2540 4764 cmd.exe 87 PID 4764 wrote to memory of 640 4764 cmd.exe 88 PID 4764 wrote to memory of 640 4764 cmd.exe 88 PID 4764 wrote to memory of 1312 4764 cmd.exe 98 PID 4764 wrote to memory of 1312 4764 cmd.exe 98 PID 4764 wrote to memory of 1856 4764 cmd.exe 99 PID 4764 wrote to memory of 1856 4764 cmd.exe 99 PID 4764 wrote to memory of 2304 4764 cmd.exe 100 PID 4764 wrote to memory of 2304 4764 cmd.exe 100 PID 4764 wrote to memory of 5664 4764 cmd.exe 101 PID 4764 wrote to memory of 5664 4764 cmd.exe 101 PID 4764 wrote to memory of 5876 4764 cmd.exe 102 PID 4764 wrote to memory of 5876 4764 cmd.exe 102 PID 4764 wrote to memory of 3760 4764 cmd.exe 103 PID 4764 wrote to memory of 3760 4764 cmd.exe 103 PID 4764 wrote to memory of 5168 4764 cmd.exe 104 PID 4764 wrote to memory of 5168 4764 cmd.exe 104 PID 4764 wrote to memory of 4640 4764 cmd.exe 105 PID 4764 wrote to memory of 4640 4764 cmd.exe 105 PID 4764 wrote to memory of 5300 4764 cmd.exe 106 PID 4764 wrote to memory of 5300 4764 cmd.exe 106 PID 4764 wrote to memory of 2472 4764 cmd.exe 107 PID 4764 wrote to memory of 2472 4764 cmd.exe 107 PID 4764 wrote to memory of 3316 4764 cmd.exe 108 PID 4764 wrote to memory of 3316 4764 cmd.exe 108 PID 4764 wrote to memory of 444 4764 cmd.exe 109 PID 4764 wrote to memory of 444 4764 cmd.exe 109 PID 4764 wrote to memory of 1068 4764 cmd.exe 110 PID 4764 wrote to memory of 1068 4764 cmd.exe 110 PID 4764 wrote to memory of 408 4764 cmd.exe 111 PID 4764 wrote to memory of 408 4764 cmd.exe 111 PID 4764 wrote to memory of 3164 4764 cmd.exe 112 PID 4764 wrote to memory of 3164 4764 cmd.exe 112 PID 4764 wrote to memory of 1720 4764 cmd.exe 114 PID 4764 wrote to memory of 1720 4764 cmd.exe 114 PID 4764 wrote to memory of 2976 4764 cmd.exe 115 PID 4764 wrote to memory of 2976 4764 cmd.exe 115 PID 4764 wrote to memory of 3196 4764 cmd.exe 116 PID 4764 wrote to memory of 3196 4764 cmd.exe 116 PID 4764 wrote to memory of 2552 4764 cmd.exe 117 PID 4764 wrote to memory of 2552 4764 cmd.exe 117 PID 4764 wrote to memory of 3832 4764 cmd.exe 118 PID 4764 wrote to memory of 3832 4764 cmd.exe 118 PID 4764 wrote to memory of 4488 4764 cmd.exe 125 PID 4764 wrote to memory of 4488 4764 cmd.exe 125 PID 4764 wrote to memory of 2880 4764 cmd.exe 126 PID 4764 wrote to memory of 2880 4764 cmd.exe 126 PID 4764 wrote to memory of 4516 4764 cmd.exe 127 PID 4764 wrote to memory of 4516 4764 cmd.exe 127 PID 4764 wrote to memory of 1892 4764 cmd.exe 128 PID 4764 wrote to memory of 1892 4764 cmd.exe 128 PID 4764 wrote to memory of 5892 4764 cmd.exe 129 PID 4764 wrote to memory of 5892 4764 cmd.exe 129 PID 4764 wrote to memory of 1808 4764 cmd.exe 130 PID 4764 wrote to memory of 1808 4764 cmd.exe 130 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection\AllowTelemetry = "0" OOSU10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAMeetNow = "1" OOSU10.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
cURL User-Agent 2 IoCs
Uses User-Agent string associated with cURL utility.
description flow ioc HTTP User-Agent header 27 curl/8.7.1 HTTP User-Agent header 38 curl/8.7.1
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Oneclick-V7.0.bat"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\system32\fltMC.exefltmc2⤵PID:600
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "CurrentBuild" 2>nul | findstr "REG_SZ"2⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\system32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "CurrentBuild"3⤵PID:2820
-
-
C:\Windows\system32\findstr.exefindstr "REG_SZ"3⤵PID:4744
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Write-Host 'Windows 11 not detected, we recommend running *Win 11 22H2 or 23H2* for the best results' -ForegroundColor White -BackgroundColor Red"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Write-Host 'Although this doesn''t mean you have to use Win 11.' -ForegroundColor White -BackgroundColor Red"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
C:\Windows\system32\sc.exesc qc "TrustedInstaller"2⤵PID:1312
-
-
C:\Windows\system32\find.exefind "START_TYPE"2⤵PID:1856
-
-
C:\Windows\system32\find.exefind "DISABLED"2⤵PID:2304
-
-
C:\Windows\system32\curl.execurl -s -L "https://github.com/QuakedK/Oneclick/raw/refs/heads/main/Downloads/OneclickTools.zip" -o "C:\\Oneclick Tools.zip"2⤵PID:5664
-
-
C:\Windows\system32\timeout.exetimeout 12⤵PID:5876
-
-
C:\Windows\system32\tar.exetar -xf "C:\\Oneclick Tools.zip" --strip-components=12⤵PID:3760
-
-
C:\Windows\system32\sc.exesc query "WinDefend"2⤵PID:5168
-
-
C:\Windows\system32\find.exefind "STATE"2⤵PID:4640
-
-
C:\Windows\system32\find.exefind "RUNNING"2⤵PID:5300
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:2472
-
-
C:\Windows\system32\timeout.exetimeout 22⤵
- Delays execution with timeout.exe
PID:3316
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:444
-
-
C:\Windows\system32\chcp.comchcp 4372⤵PID:1068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Write-Host 'Recommended!' -ForegroundColor White -BackgroundColor Red"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:408
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Unrestricted -NoProfile Enable-ComputerRestore -Drive 'C:\'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3164
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "RPSessionInterval" /f2⤵PID:1720
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "DisableConfig" /f2⤵PID:2976
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "SystemRestorePointCreationFrequency" /t REG_DWORD /d 0 /f2⤵PID:3196
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:2552
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Checkpoint-Computer -Description 'OneClick V7.0 Restore Point'"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
-
C:\Windows\system32\timeout.exetimeout 22⤵
- Delays execution with timeout.exe
PID:4488
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:2880
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:4516
-
-
C:\Windows\system32\chcp.comchcp 4372⤵PID:1892
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableActivityFeed" /t REG_DWORD /d 0 /f2⤵PID:5892
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "PublishUserActivities" /t REG_DWORD /d 0 /f2⤵PID:1808
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "UploadUserActivities" /t REG_DWORD /d 0 /f2⤵PID:236
-
-
C:\Windows\system32\timeout.exetimeout 12⤵PID:3740
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location" /v "Value" /t REG_SZ /d "Deny" /f2⤵PID:3708
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Sensor\Overrides\{BFA794E4-F964-4FDB-90F6-51056BFE4B44}" /v "SensorPermissionState" /t REG_DWORD /d 0 /f2⤵PID:2648
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\lfsvc\Service\Configuration" /v "Status" /t REG_DWORD /d 0 /f2⤵PID:628
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\Maps" /v "AutoUpdateEnabled" /t REG_DWORD /d 0 /f2⤵PID:4876
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:3252
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Policies\Microsoft\Windows\Explorer" /v DisableNotificationCenter /t REG_DWORD /d 1 /f2⤵PID:4392
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\PushNotifications" /v ToastEnabled /t REG_DWORD /d 0 /f2⤵PID:2952
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:2460
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Remove-Item -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\StorageSense\Parameters\StoragePolicy' -Recurse -ErrorAction SilentlyContinue"2⤵
- Hide Artifacts: Ignore Process Interrupts
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:2736
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v Flags /t REG_SZ /d 506 /f2⤵PID:1788
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:2104
-
-
C:\Windows\system32\reg.exereg.exe add "HKU\.DEFAULT\Control Panel\Keyboard" /v InitialKeyboardIndicators /t REG_DWORD /d 80000002 /f2⤵
- Modifies data under HKEY_USERS
PID:3700
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:4808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "New-Item -Path 'HKCU:\Software\Classes\CLSID\{86ca1aa0-34aa-4e8b-a509-50c905bae2a2}' -Name 'InprocServer32' -Force -Value ''"2⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5264
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:4312
-
-
C:\Windows\system32\reg.exereg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v HideFileExt /t REG_DWORD /d 0 /f2⤵
- Modifies visibility of file extensions in Explorer
PID:1644
-
-
C:\Windows\system32\timeout.exetimeout 12⤵PID:1860
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Hidden /t REG_DWORD /d 1 /f2⤵PID:784
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:3388
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v TaskbarDa /t REG_DWORD /d 0 /f2⤵PID:5380
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:4076
-
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Desktop" /v "DragFullWindows" /t REG_SZ /d "0" /f2⤵PID:1308
-
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Desktop" /v "MenuShowDelay" /t REG_SZ /d "200" /f2⤵PID:4708
-
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Desktop\WindowMetrics" /v "MinAnimate" /t REG_SZ /d "0" /f2⤵PID:4984
-
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Keyboard" /v "KeyboardDelay" /t REG_DWORD /d 0 /f2⤵PID:4856
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ListviewAlphaSelect" /t REG_DWORD /d 0 /f2⤵PID:5008
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ListviewShadow" /t REG_DWORD /d 0 /f2⤵PID:2312
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "TaskbarAnimations" /t REG_DWORD /d 0 /f2⤵PID:4360
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\VisualEffects" /v "VisualFXSetting" /t REG_DWORD /d 3 /f2⤵PID:1992
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\DWM" /v "EnableAeroPeek" /t REG_DWORD /d 0 /f2⤵PID:2200
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "TaskbarMn" /t REG_DWORD /d 0 /f2⤵PID:1056
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "TaskbarDa" /t REG_DWORD /d 0 /f2⤵PID:4084
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ShowTaskViewButton" /t REG_DWORD /d 0 /f2⤵PID:4032
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Search" /v "SearchboxTaskbarMode" /t REG_DWORD /d 0 /f2⤵PID:4780
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-ItemProperty -Path 'HKCU:\Control Panel\Desktop' -Name 'UserPreferencesMask' -Type Binary -Value ([byte[]](144,18,3,128,16,0,0,0))"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\system32\timeout.exetimeout 12⤵PID:2588
-
-
C:\Windows\system32\reg.exereg add "HKCU\System\GameConfigStore" /v GameDVR_FSEBehavior /t REG_DWORD /d 2 /f2⤵PID:1224
-
-
C:\Windows\system32\reg.exereg add "HKCU\System\GameConfigStore" /v GameDVR_Enabled /t REG_DWORD /d 0 /f2⤵PID:4296
-
-
C:\Windows\system32\reg.exereg add "HKCU\System\GameConfigStore" /v GameDVR_DXGIHonorFSEWindowsCompatible /t REG_DWORD /d 1 /f2⤵PID:5708
-
-
C:\Windows\system32\reg.exereg add "HKCU\System\GameConfigStore" /v GameDVR_HonorUserFSEBehaviorMode /t REG_DWORD /d 1 /f2⤵PID:4656
-
-
C:\Windows\system32\reg.exereg add "HKCU\System\GameConfigStore" /v GameDVR_EFSEFeatureFlags /t REG_DWORD /d 0 /f2⤵PID:4380
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\GameDVR" /v AllowGameDVR /t REG_DWORD /d 0 /f2⤵PID:5216
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Search" /v BingSearchEnabled /t REG_DWORD /d 0 /f2⤵PID:4636
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:2412
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\GameBar" /v "AllowAutoGameMode" /t REG_DWORD /d 0 /f2⤵PID:6100
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\GameBar" /v "AutoGameModeEnabled" /t REG_DWORD /d 0 /f2⤵PID:3524
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:3772
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\GraphicsDrivers" /v "HwSchMode" /t REG_DWORD /d 2 /f2⤵PID:2240
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:60
-
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Themes\Personalize /v EnableTransparency /t REG_DWORD /d 0 /f2⤵
- Modifies registry key
PID:5356
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:4712
-
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Mouse" /v MouseSpeed /t REG_SZ /d 0 /f2⤵PID:1320
-
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Mouse" /v MouseThreshold1 /t REG_SZ /d 0 /f2⤵PID:5132
-
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Mouse" /v MouseThreshold2 /t REG_SZ /d 0 /f2⤵PID:1752
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:5688
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\Session Manager\Power" /v HibernateEnabled /t REG_DWORD /d 0 /f2⤵PID:5592
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FlyoutMenuSettings" /v ShowHibernateOption /t REG_DWORD /d 0 /f2⤵PID:4028
-
-
C:\Windows\system32\powercfg.exepowercfg.exe /hibernate off2⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5376
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:5832
-
-
C:\Windows\system32\sc.exesc config HomeGroupListener start=demand2⤵
- Launches sc.exe
PID:1680
-
-
C:\Windows\system32\sc.exesc config HomeGroupProvider start=demand2⤵
- Launches sc.exe
PID:4468
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:5868
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\PolicyManager\default\WiFi\AllowWiFiHotSpotReporting" /v "Value" /t REG_DWORD /d 0 /f2⤵PID:1008
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\PolicyManager\default\WiFi\AllowAutoConnectToWiFiSenseHotspots" /v "Value" /t REG_DWORD /d 0 /f2⤵PID:3176
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:5488
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters" /v DisabledComponents /t REG_DWORD /d 1 /f2⤵PID:1112
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:2636
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters" /v "DisabledComponents" /t REG_DWORD /d 255 /f2⤵PID:3992
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Disable-NetAdapterBinding -Name '*' -ComponentID ms_tcpip6"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3484
-
-
C:\Windows\system32\timeout.exetimeout 12⤵PID:2640
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /f /v EnableLUA /t REG_DWORD /d 02⤵
- UAC bypass
PID:2712
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:2660
-
-
C:\Windows\system32\chcp.comchcp 4372⤵PID:4348
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:4544
-
-
C:\Windows\system32\sc.exesc config AJRouter start=disabled2⤵PID:4444
-
-
C:\Windows\system32\sc.exesc config ALG start=demand2⤵PID:3884
-
-
C:\Windows\system32\sc.exesc config AppIDSvc start=demand2⤵PID:6004
-
-
C:\Windows\system32\sc.exesc config AppMgmt start=demand2⤵PID:2744
-
-
C:\Windows\system32\sc.exesc config AppReadiness start=demand2⤵PID:1932
-
-
C:\Windows\system32\sc.exesc config AppVClient start=disabled2⤵PID:5912
-
-
C:\Windows\system32\sc.exesc config AppXSvc start=demand2⤵PID:2500
-
-
C:\Windows\system32\sc.exesc config Appinfo start=demand2⤵
- Launches sc.exe
PID:4400
-
-
C:\Windows\system32\sc.exesc config AssignedAccessManagerSvc start=disabled2⤵PID:1172
-
-
C:\Windows\system32\sc.exesc config AudioEndpointBuilder start=auto2⤵PID:1988
-
-
C:\Windows\system32\sc.exesc config AudioSrv start=auto2⤵PID:3740
-
-
C:\Windows\system32\sc.exesc config Audiosrv start=auto2⤵PID:4436
-
-
C:\Windows\system32\sc.exesc config AxInstSV start=demand2⤵PID:5512
-
-
C:\Windows\system32\sc.exesc config BDESVC start=demand2⤵PID:5348
-
-
C:\Windows\system32\sc.exesc config BFE start=auto2⤵PID:5188
-
-
C:\Windows\system32\sc.exesc config BITS start=delayed-auto2⤵PID:1192
-
-
C:\Windows\system32\sc.exesc config BTAGService start=demand2⤵PID:5344
-
-
C:\Windows\system32\sc.exesc config BcastDVRUserService_dc2a4 start=demand2⤵
- Launches sc.exe
PID:384
-
-
C:\Windows\system32\sc.exesc config BluetoothUserService_dc2a4 start=demand2⤵PID:3640
-
-
C:\Windows\system32\sc.exesc config BrokerInfrastructure start=auto2⤵PID:3684
-
-
C:\Windows\system32\sc.exesc config Browser start=demand2⤵PID:1628
-
-
C:\Windows\system32\sc.exesc config BthAvctpSvc start=auto2⤵PID:692
-
-
C:\Windows\system32\sc.exesc config BthHFSrv start=auto2⤵PID:5316
-
-
C:\Windows\system32\sc.exesc config CDPSvc start=demand2⤵PID:1800
-
-
C:\Windows\system32\sc.exesc config CDPUserSvc_dc2a4 start=auto2⤵PID:5860
-
-
C:\Windows\system32\sc.exesc config COMSysApp start=demand2⤵PID:4472
-
-
C:\Windows\system32\sc.exesc config CaptureService_dc2a4 start=demand2⤵
- Launches sc.exe
PID:3396
-
-
C:\Windows\system32\sc.exesc config CertPropSvc start=demand2⤵PID:2904
-
-
C:\Windows\system32\sc.exesc config ClipSVC start=demand2⤵PID:3636
-
-
C:\Windows\system32\sc.exesc config ConsentUxUserSvc_dc2a4 start=demand2⤵PID:648
-
-
C:\Windows\system32\sc.exesc config CoreMessagingRegistrar start=auto2⤵
- Launches sc.exe
PID:1244
-
-
C:\Windows\system32\sc.exesc config CredentialEnrollmentManagerUserSvc_dc2a4 start=demand2⤵PID:5768
-
-
C:\Windows\system32\sc.exesc config CryptSvc start=auto2⤵PID:1580
-
-
C:\Windows\system32\sc.exesc config CscService start=demand2⤵PID:1336
-
-
C:\Windows\system32\sc.exesc config DPS start=auto2⤵
- Launches sc.exe
PID:2104
-
-
C:\Windows\system32\sc.exesc config DcomLaunch start=auto2⤵
- Launches sc.exe
PID:3700
-
-
C:\Windows\system32\sc.exesc config DcpSvc start=demand2⤵PID:5956
-
-
C:\Windows\system32\sc.exesc config DevQueryBroker start=demand2⤵PID:1212
-
-
C:\Windows\system32\sc.exesc config DeviceAssociationBrokerSvc_dc2a4 start=demand2⤵PID:4900
-
-
C:\Windows\system32\sc.exesc config DeviceAssociationService start=demand2⤵PID:3304
-
-
C:\Windows\system32\sc.exesc config DeviceInstall start=demand2⤵PID:3752
-
-
C:\Windows\system32\sc.exesc config DevicePickerUserSvc_dc2a4 start=demand2⤵PID:3292
-
-
C:\Windows\system32\sc.exesc config DevicesFlowUserSvc_dc2a4 start=demand2⤵PID:1504
-
-
C:\Windows\system32\sc.exesc config Dhcp start=auto2⤵PID:112
-
-
C:\Windows\system32\sc.exesc config DiagTrack start=disabled2⤵PID:5264
-
-
C:\Windows\system32\sc.exesc config DialogBlockingService start=disabled2⤵PID:4312
-
-
C:\Windows\system32\sc.exesc config DispBrokerDesktopSvc start=auto2⤵
- Launches sc.exe
PID:1644
-
-
C:\Windows\system32\sc.exesc config DisplayEnhancementService start=demand2⤵PID:1860
-
-
C:\Windows\system32\sc.exesc config DmEnrollmentSvc start=demand2⤵PID:784
-
-
C:\Windows\system32\sc.exesc config Dnscache start=auto2⤵PID:5960
-
-
C:\Windows\system32\sc.exesc config DoSvc start=delayed-auto2⤵PID:2664
-
-
C:\Windows\system32\sc.exesc config DsSvc start=demand2⤵PID:4728
-
-
C:\Windows\system32\sc.exesc config DsmSvc start=demand2⤵PID:2748
-
-
C:\Windows\system32\sc.exesc config DusmSvc start=auto2⤵PID:640
-
-
C:\Windows\system32\sc.exesc config EFS start=demand2⤵PID:556
-
-
C:\Windows\system32\sc.exesc config EapHost start=demand2⤵
- Launches sc.exe
PID:4076
-
-
C:\Windows\system32\sc.exesc config EntAppSvc start=demand2⤵PID:4644
-
-
C:\Windows\system32\sc.exesc config EventLog start=auto2⤵PID:3068
-
-
C:\Windows\system32\sc.exesc config EventSystem start=auto2⤵PID:5804
-
-
C:\Windows\system32\sc.exesc config FDResPub start=demand2⤵PID:4200
-
-
C:\Windows\system32\sc.exesc config Fax start=demand2⤵
- Launches sc.exe
PID:2272
-
-
C:\Windows\system32\sc.exesc config FontCache start=auto2⤵PID:5088
-
-
C:\Windows\system32\sc.exesc config FrameServer start=demand2⤵PID:3140
-
-
C:\Windows\system32\sc.exesc config FrameServerMonitor start=demand2⤵PID:5816
-
-
C:\Windows\system32\sc.exesc config GraphicsPerfSvc start=demand2⤵PID:952
-
-
C:\Windows\system32\sc.exesc config HomeGroupListener start=demand2⤵PID:2196
-
-
C:\Windows\system32\sc.exesc config HomeGroupProvider start=demand2⤵
- Launches sc.exe
PID:3356
-
-
C:\Windows\system32\sc.exesc config HvHost start=demand2⤵PID:5724
-
-
C:\Windows\system32\sc.exesc config IEEtwCollectorService start=demand2⤵PID:4680
-
-
C:\Windows\system32\sc.exesc config IKEEXT start=demand2⤵PID:2392
-
-
C:\Windows\system32\sc.exesc config InstallService start=demand2⤵PID:5808
-
-
C:\Windows\system32\sc.exesc config InventorySvc start=demand2⤵PID:1912
-
-
C:\Windows\system32\sc.exesc config IpxlatCfgSvc start=demand2⤵PID:5240
-
-
C:\Windows\system32\sc.exesc config KeyIso start=auto2⤵
- Launches sc.exe
PID:5224
-
-
C:\Windows\system32\sc.exesc config KtmRm start=demand2⤵PID:232
-
-
C:\Windows\system32\sc.exesc config LSM start=auto2⤵PID:2520
-
-
C:\Windows\system32\sc.exesc config LanmanServer start=auto2⤵PID:2588
-
-
C:\Windows\system32\sc.exesc config LanmanWorkstation start=auto2⤵PID:1224
-
-
C:\Windows\system32\sc.exesc config LicenseManager start=demand2⤵
- Launches sc.exe
PID:4296
-
-
C:\Windows\system32\sc.exesc config LxpSvc start=demand2⤵PID:5708
-
-
C:\Windows\system32\sc.exesc config MSDTC start=disabled2⤵PID:4656
-
-
C:\Windows\system32\sc.exesc config MSiSCSI start=demand2⤵PID:4380
-
-
C:\Windows\system32\sc.exesc config MapsBroker start=delayed-auto2⤵PID:5216
-
-
C:\Windows\system32\sc.exesc config McpManagementService start=demand2⤵PID:4636
-
-
C:\Windows\system32\sc.exesc config MessagingService_dc2a4 start=demand2⤵
- Launches sc.exe
PID:5284
-
-
C:\Windows\system32\sc.exesc config MicrosoftEdgeElevationService start=demand2⤵PID:5992
-
-
C:\Windows\system32\sc.exesc config MixedRealityOpenXRSvc start=demand2⤵PID:396
-
-
C:\Windows\system32\sc.exesc config MpsSvc start=auto2⤵PID:1760
-
-
C:\Windows\system32\sc.exesc config MsKeyboardFilter start=demand2⤵PID:3652
-
-
C:\Windows\system32\sc.exesc config NPSMSvc_dc2a4 start=demand2⤵PID:688
-
-
C:\Windows\system32\sc.exesc config NaturalAuthentication start=demand2⤵PID:2044
-
-
C:\Windows\system32\sc.exesc config NcaSvc start=demand2⤵PID:5720
-
-
C:\Windows\system32\sc.exesc config NcbService start=demand2⤵PID:5276
-
-
C:\Windows\system32\sc.exesc config NcdAutoSetup start=demand2⤵PID:408
-
-
C:\Windows\system32\sc.exesc config NetSetupSvc start=demand2⤵PID:5364
-
-
C:\Windows\system32\sc.exesc config NetTcpPortSharing start=disabled2⤵PID:2716
-
-
C:\Windows\system32\sc.exesc config Netlogon start=demand2⤵PID:5688
-
-
C:\Windows\system32\sc.exesc config Netman start=demand2⤵PID:5592
-
-
C:\Windows\system32\sc.exesc config NgcCtnrSvc start=demand2⤵PID:5568
-
-
C:\Windows\system32\sc.exesc config NgcSvc start=demand2⤵PID:2076
-
-
C:\Windows\system32\sc.exesc config NlaSvc start=demand2⤵PID:2396
-
-
C:\Windows\system32\sc.exesc config OneSyncSvc_dc2a4 start=auto2⤵PID:2140
-
-
C:\Windows\system32\sc.exesc config P9RdrService_dc2a4 start=demand2⤵PID:3532
-
-
C:\Windows\system32\sc.exesc config PNRPAutoReg start=demand2⤵PID:2976
-
-
C:\Windows\system32\sc.exesc config PNRPsvc start=demand2⤵PID:3012
-
-
C:\Windows\system32\sc.exesc config PcaSvc start=demand2⤵PID:5320
-
-
C:\Windows\system32\sc.exesc config PeerDistSvc start=demand2⤵PID:3480
-
-
C:\Windows\system32\sc.exesc config PenService_dc2a4 start=demand2⤵PID:1700
-
-
C:\Windows\system32\sc.exesc config PerfHost start=demand2⤵PID:1552
-
-
C:\Windows\system32\sc.exesc config PhoneSvc start=demand2⤵PID:3244
-
-
C:\Windows\system32\sc.exesc config PimIndexMaintenanceSvc_dc2a4 start=demand2⤵PID:4720
-
-
C:\Windows\system32\sc.exesc config PlugPlay start=demand2⤵
- Launches sc.exe
PID:5764
-
-
C:\Windows\system32\sc.exesc config PolicyAgent start=demand2⤵PID:3016
-
-
C:\Windows\system32\sc.exesc config Power start=auto2⤵PID:5468
-
-
C:\Windows\system32\sc.exesc config PrintNotify start=demand2⤵PID:4768
-
-
C:\Windows\system32\sc.exesc config PrintWorkflowUserSvc_dc2a4 start=demand2⤵PID:4156
-
-
C:\Windows\system32\sc.exesc config ProfSvc start=auto2⤵PID:3588
-
-
C:\Windows\system32\sc.exesc config PushToInstall start=demand2⤵PID:1396
-
-
C:\Windows\system32\sc.exesc config QWAVE start=demand2⤵PID:3880
-
-
C:\Windows\system32\sc.exesc config RasAuto start=demand2⤵PID:5632
-
-
C:\Windows\system32\sc.exesc config RasMan start=demand2⤵PID:3484
-
-
C:\Windows\system32\sc.exesc config RemoteAccess start=disabled2⤵PID:4848
-
-
C:\Windows\system32\sc.exesc config RemoteRegistry start=disabled2⤵PID:2640
-
-
C:\Windows\system32\sc.exesc config RetailDemo start=demand2⤵PID:2712
-
-
C:\Windows\system32\sc.exesc config RmSvc start=demand2⤵PID:1304
-
-
C:\Windows\system32\sc.exesc config RpcEptMapper start=auto2⤵PID:5092
-
-
C:\Windows\system32\sc.exesc config RpcLocator start=demand2⤵
- Launches sc.exe
PID:4812
-
-
C:\Windows\system32\sc.exesc config RpcSs start=auto2⤵PID:1516
-
-
C:\Windows\system32\sc.exesc config SCPolicySvc start=demand2⤵PID:5060
-
-
C:\Windows\system32\sc.exesc config SCardSvr start=demand2⤵PID:4972
-
-
C:\Windows\system32\sc.exesc config SDRSVC start=demand2⤵
- Launches sc.exe
PID:4516
-
-
C:\Windows\system32\sc.exesc config SEMgrSvc start=demand2⤵PID:1892
-
-
C:\Windows\system32\sc.exesc config SENS start=auto2⤵PID:116
-
-
C:\Windows\system32\sc.exesc config SNMPTRAP start=demand2⤵
- Launches sc.exe
PID:1808
-
-
C:\Windows\system32\sc.exesc config SNMPTrap start=demand2⤵PID:5596
-
-
C:\Windows\system32\sc.exesc config SSDPSRV start=demand2⤵PID:4684
-
-
C:\Windows\system32\sc.exesc config SamSs start=auto2⤵PID:5936
-
-
C:\Windows\system32\sc.exesc config ScDeviceEnum start=demand2⤵PID:4432
-
-
C:\Windows\system32\sc.exesc config Schedule start=auto2⤵PID:3708
-
-
C:\Windows\system32\sc.exesc config SecurityHealthService start=demand2⤵PID:2648
-
-
C:\Windows\system32\sc.exesc config Sense start=demand2⤵
- Launches sc.exe
PID:628
-
-
C:\Windows\system32\sc.exesc config SensorDataService start=demand2⤵PID:4876
-
-
C:\Windows\system32\sc.exesc config SensorService start=demand2⤵PID:2960
-
-
C:\Windows\system32\sc.exesc config SensrSvc start=demand2⤵PID:1548
-
-
C:\Windows\system32\sc.exesc config SessionEnv start=demand2⤵PID:4068
-
-
C:\Windows\system32\sc.exesc config SgrmBroker start=auto2⤵PID:2456
-
-
C:\Windows\system32\sc.exesc config SharedAccess start=demand2⤵PID:2968
-
-
C:\Windows\system32\sc.exesc config SharedRealitySvc start=demand2⤵PID:3560
-
-
C:\Windows\system32\sc.exesc config ShellHWDetection start=auto2⤵PID:2360
-
-
C:\Windows\system32\sc.exesc config SmsRouter start=demand2⤵PID:3312
-
-
C:\Windows\system32\sc.exesc config Spooler start=auto2⤵PID:2460
-
-
C:\Windows\system32\sc.exesc config SstpSvc start=demand2⤵PID:1168
-
-
C:\Windows\system32\sc.exesc config StateRepository start=demand2⤵PID:4248
-
-
C:\Windows\system32\sc.exesc config StiSvc start=demand2⤵PID:3116
-
-
C:\Windows\system32\sc.exesc config StorSvc start=demand2⤵PID:3168
-
-
C:\Windows\system32\sc.exesc config SysMain start=auto2⤵PID:2752
-
-
C:\Windows\system32\sc.exesc config SystemEventsBroker start=auto2⤵PID:3768
-
-
C:\Windows\system32\sc.exesc config TabletInputService start=demand2⤵PID:2008
-
-
C:\Windows\system32\sc.exesc config TapiSrv start=demand2⤵PID:2024
-
-
C:\Windows\system32\sc.exesc config TermService start=auto2⤵PID:948
-
-
C:\Windows\system32\sc.exesc config TextInputManagementService start=demand2⤵PID:4176
-
-
C:\Windows\system32\sc.exesc config Themes start=auto2⤵PID:4424
-
-
C:\Windows\system32\sc.exesc config TieringEngineService start=demand2⤵PID:3064
-
-
C:\Windows\system32\sc.exesc config TimeBroker start=demand2⤵PID:4512
-
-
C:\Windows\system32\sc.exesc config TimeBrokerSvc start=demand2⤵PID:1124
-
-
C:\Windows\system32\sc.exesc config TokenBroker start=demand2⤵PID:3848
-
-
C:\Windows\system32\sc.exesc config TrkWks start=auto2⤵PID:3108
-
-
C:\Windows\system32\sc.exesc config TroubleshootingSvc start=demand2⤵PID:3964
-
-
C:\Windows\system32\sc.exesc config TrustedInstaller start=demand2⤵PID:3092
-
-
C:\Windows\system32\sc.exesc config UI0Detect start=demand2⤵PID:324
-
-
C:\Windows\system32\sc.exesc config UdkUserSvc_dc2a4 start=demand2⤵PID:3712
-
-
C:\Windows\system32\sc.exesc config UevAgentService start=disabled2⤵PID:516
-
-
C:\Windows\system32\sc.exesc config UmRdpService start=demand2⤵PID:4648
-
-
C:\Windows\system32\sc.exesc config UnistoreSvc_dc2a4 start=demand2⤵PID:4556
-
-
C:\Windows\system32\sc.exesc config UserDataSvc_dc2a4 start=demand2⤵PID:8
-
-
C:\Windows\system32\sc.exesc config UserManager start=auto2⤵PID:1692
-
-
C:\Windows\system32\sc.exesc config UsoSvc start=demand2⤵PID:5716
-
-
C:\Windows\system32\sc.exesc config VGAuthService start=auto2⤵
- Launches sc.exe
PID:3488
-
-
C:\Windows\system32\sc.exesc config VMTools start=auto2⤵PID:968
-
-
C:\Windows\system32\sc.exesc config VSS start=demand2⤵PID:4196
-
-
C:\Windows\system32\sc.exesc config VacSvc start=demand2⤵PID:3648
-
-
C:\Windows\system32\sc.exesc config VaultSvc start=auto2⤵PID:900
-
-
C:\Windows\system32\sc.exesc config W32Time start=demand2⤵PID:3180
-
-
C:\Windows\system32\sc.exesc config WEPHOSTSVC start=demand2⤵PID:1040
-
-
C:\Windows\system32\sc.exesc config WFDSConMgrSvc start=demand2⤵
- Launches sc.exe
PID:5696
-
-
C:\Windows\system32\sc.exesc config WMPNetworkSvc start=demand2⤵PID:2332
-
-
C:\Windows\system32\sc.exesc config WManSvc start=demand2⤵PID:4492
-
-
C:\Windows\system32\sc.exesc config WPDBusEnum start=demand2⤵PID:1316
-
-
C:\Windows\system32\sc.exesc config WSService start=demand2⤵PID:536
-
-
C:\Windows\system32\sc.exesc config WSearch start=delayed-auto2⤵PID:2200
-
-
C:\Windows\system32\sc.exesc config WaaSMedicSvc start=demand2⤵PID:3824
-
-
C:\Windows\system32\sc.exesc config WalletService start=demand2⤵PID:4932
-
-
C:\Windows\system32\sc.exesc config WarpJITSvc start=demand2⤵PID:5244
-
-
C:\Windows\system32\sc.exesc config WbioSrvc start=demand2⤵
- Launches sc.exe
PID:5396
-
-
C:\Windows\system32\sc.exesc config Wcmsvc start=auto2⤵PID:5248
-
-
C:\Windows\system32\sc.exesc config WcsPlugInService start=demand2⤵PID:5140
-
-
C:\Windows\system32\sc.exesc config WdNisSvc start=demand2⤵PID:1312
-
-
C:\Windows\system32\sc.exesc config WdiServiceHost start=demand2⤵
- Launches sc.exe
PID:1872
-
-
C:\Windows\system32\sc.exesc config WdiSystemHost start=demand2⤵PID:2304
-
-
C:\Windows\system32\sc.exesc config WebClient start=demand2⤵PID:832
-
-
C:\Windows\system32\sc.exesc config Wecsvc start=demand2⤵PID:4796
-
-
C:\Windows\system32\sc.exesc config WerSvc start=demand2⤵
- Launches sc.exe
PID:3340
-
-
C:\Windows\system32\sc.exesc config WiaRpc start=demand2⤵PID:5136
-
-
C:\Windows\system32\sc.exesc config WinDefend start=auto2⤵PID:5148
-
-
C:\Windows\system32\sc.exesc config WinHttpAutoProxySvc start=demand2⤵
- Launches sc.exe
PID:3328
-
-
C:\Windows\system32\sc.exesc config WinRM start=demand2⤵PID:4652
-
-
C:\Windows\system32\sc.exesc config Winmgmt start=auto2⤵PID:756
-
-
C:\Windows\system32\sc.exesc config WlanSvc start=auto2⤵PID:5836
-
-
C:\Windows\system32\sc.exesc config WpcMonSvc start=demand2⤵PID:380
-
-
C:\Windows\system32\sc.exesc config WpnService start=demand2⤵PID:4640
-
-
C:\Windows\system32\sc.exesc config WpnUserService_dc2a4 start=auto2⤵PID:404
-
-
C:\Windows\system32\sc.exesc config WwanSvc start=demand2⤵PID:2524
-
-
C:\Windows\system32\sc.exesc config XblAuthManager start=demand2⤵PID:2120
-
-
C:\Windows\system32\sc.exesc config XblGameSave start=demand2⤵PID:444
-
-
C:\Windows\system32\sc.exesc config XboxGipSvc start=demand2⤵PID:3772
-
-
C:\Windows\system32\sc.exesc config XboxNetApiSvc start=demand2⤵
- Launches sc.exe
PID:3516
-
-
C:\Windows\system32\sc.exesc config autotimesvc start=demand2⤵PID:60
-
-
C:\Windows\system32\sc.exesc config bthserv start=demand2⤵PID:1756
-
-
C:\Windows\system32\sc.exesc config camsvc start=demand2⤵PID:1864
-
-
C:\Windows\system32\sc.exesc config cbdhsvc_dc2a4 start=demand2⤵PID:1524
-
-
C:\Windows\system32\sc.exesc config cloudidsvc start=demand2⤵
- Launches sc.exe
PID:5352
-
-
C:\Windows\system32\sc.exesc config dcsvc start=demand2⤵PID:4584
-
-
C:\Windows\system32\sc.exesc config defragsvc start=demand2⤵PID:1740
-
-
C:\Windows\system32\sc.exesc config diagnosticshub.standardcollector.service start=demand2⤵PID:3052
-
-
C:\Windows\system32\sc.exesc config diagsvc start=demand2⤵PID:4332
-
-
C:\Windows\system32\sc.exesc config dmwappushservice start=demand2⤵PID:4028
-
-
C:\Windows\system32\sc.exesc config dot3svc start=demand2⤵PID:5376
-
-
C:\Windows\system32\sc.exesc config edgeupdate start=demand2⤵
- Launches sc.exe
PID:5832
-
-
C:\Windows\system32\sc.exesc config edgeupdatem start=demand2⤵PID:1572
-
-
C:\Windows\system32\sc.exesc config embeddedmode start=demand2⤵PID:4468
-
-
C:\Windows\system32\sc.exesc config fdPHost start=demand2⤵PID:2556
-
-
C:\Windows\system32\sc.exesc config fhsvc start=demand2⤵PID:3196
-
-
C:\Windows\system32\sc.exesc config gpsvc start=auto2⤵PID:2552
-
-
C:\Windows\system32\sc.exesc config hidserv start=demand2⤵PID:2068
-
-
C:\Windows\system32\sc.exesc config icssvc start=demand2⤵PID:5488
-
-
C:\Windows\system32\sc.exesc config iphlpsvc start=auto2⤵PID:2220
-
-
C:\Windows\system32\sc.exesc config lfsvc start=demand2⤵
- Launches sc.exe
PID:2636
-
-
C:\Windows\system32\sc.exesc config lltdsvc start=demand2⤵PID:3992
-
-
C:\Windows\system32\sc.exesc config lmhosts start=demand2⤵PID:4532
-
-
C:\Windows\system32\sc.exesc config mpssvc start=auto2⤵PID:5732
-
-
C:\Windows\system32\sc.exesc config msiserver start=demand2⤵PID:5332
-
-
C:\Windows\system32\sc.exesc config netprofm start=demand2⤵PID:4536
-
-
C:\Windows\system32\sc.exesc config nsi start=auto2⤵PID:5648
-
-
C:\Windows\system32\sc.exesc config p2pimsvc start=demand2⤵PID:2788
-
-
C:\Windows\system32\sc.exesc config p2psvc start=demand2⤵
- Launches sc.exe
PID:3720
-
-
C:\Windows\system32\sc.exesc config perceptionsimulation start=demand2⤵
- Launches sc.exe
PID:1348
-
-
C:\Windows\system32\sc.exesc config pla start=demand2⤵PID:3272
-
-
C:\Windows\system32\sc.exesc config seclogon start=demand2⤵PID:5000
-
-
C:\Windows\system32\sc.exesc config shpamsvc start=disabled2⤵PID:3348
-
-
C:\Windows\system32\sc.exesc config smphost start=disabled2⤵PID:4592
-
-
C:\Windows\system32\sc.exesc config spectrum start=demand2⤵PID:1476
-
-
C:\Windows\system32\sc.exesc config sppsvc start=delayed-auto2⤵PID:2660
-
-
C:\Windows\system32\sc.exesc config ssh-agent start=disabled2⤵PID:4348
-
-
C:\Windows\system32\sc.exesc config svsvc start=demand2⤵PID:4544
-
-
C:\Windows\system32\sc.exesc config swprv start=demand2⤵PID:4444
-
-
C:\Windows\system32\sc.exesc config tiledatamodelsvc start=auto2⤵
- Launches sc.exe
PID:3884
-
-
C:\Windows\system32\sc.exesc config tzautoupdate start=disabled2⤵PID:6004
-
-
C:\Windows\system32\sc.exesc config uhssvc start=disabled2⤵PID:2744
-
-
C:\Windows\system32\sc.exesc config upnphost start=demand2⤵
- Launches sc.exe
PID:1932
-
-
C:\Windows\system32\sc.exesc config vds start=demand2⤵PID:5912
-
-
C:\Windows\system32\sc.exesc config vm3dservice start=demand2⤵PID:2500
-
-
C:\Windows\system32\sc.exesc config vmicguestinterface start=demand2⤵PID:4400
-
-
C:\Windows\system32\sc.exesc config vmicheartbeat start=demand2⤵PID:1172
-
-
C:\Windows\system32\sc.exesc config vmickvpexchange start=demand2⤵PID:1988
-
-
C:\Windows\system32\sc.exesc config vmicrdv start=demand2⤵PID:3740
-
-
C:\Windows\system32\sc.exesc config vmicshutdown start=demand2⤵PID:4436
-
-
C:\Windows\system32\sc.exesc config vmictimesync start=demand2⤵PID:5512
-
-
C:\Windows\system32\sc.exesc config vmicvmsession start=demand2⤵PID:5348
-
-
C:\Windows\system32\sc.exesc config vmicvss start=demand2⤵
- Launches sc.exe
PID:5188
-
-
C:\Windows\system32\sc.exesc config vmvss start=demand2⤵PID:1192
-
-
C:\Windows\system32\sc.exesc config wbengine start=demand2⤵PID:5344
-
-
C:\Windows\system32\sc.exesc config wcncsvc start=demand2⤵PID:384
-
-
C:\Windows\system32\sc.exesc config webthreatdefsvc start=demand2⤵PID:3640
-
-
C:\Windows\system32\sc.exesc config webthreatdefusersvc_dc2a4 start=auto2⤵PID:3684
-
-
C:\Windows\system32\sc.exesc config wercplsupport start=demand2⤵PID:1628
-
-
C:\Windows\system32\sc.exesc config wisvc start=demand2⤵PID:692
-
-
C:\Windows\system32\sc.exesc config wlidsvc start=demand2⤵PID:5316
-
-
C:\Windows\system32\sc.exesc config wlpasvc start=demand2⤵
- Launches sc.exe
PID:2460
-
-
C:\Windows\system32\sc.exesc config wmiApSrv start=demand2⤵PID:1168
-
-
C:\Windows\system32\sc.exesc config workfolderssvc start=demand2⤵PID:4248
-
-
C:\Windows\system32\sc.exesc config wscsvc start=delayed-auto2⤵PID:3116
-
-
C:\Windows\system32\sc.exesc config wuauserv start=demand2⤵PID:3168
-
-
C:\Windows\system32\sc.exesc config wudfsvc start=demand2⤵PID:2752
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:648
-
-
C:\Windows\system32\timeout.exetimeout 12⤵PID:2736
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /Disable2⤵PID:1788
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Application Experience\ProgramDataUpdater" /Disable2⤵PID:1616
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Autochk\Proxy" /Disable2⤵PID:2776
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Customer Experience Improvement Program\Consolidator" /Disable2⤵PID:4140
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Customer Experience Improvement Program\UsbCeip" /Disable2⤵PID:2268
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector" /Disable2⤵PID:3828
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Feedback\Siuf\DmClient" /Disable2⤵PID:3308
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Feedback\Siuf\DmClientOnScenarioDownload" /Disable2⤵PID:5784
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Error Reporting\QueueReporting" /Disable2⤵PID:6128
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Application Experience\MareBackup" /Disable2⤵PID:1648
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Application Experience\StartupAppTask" /Disable2⤵PID:3104
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Application Experience\PcaPatchDbTask" /Disable2⤵PID:1672
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Maps\MapsUpdateTask" /Disable2⤵PID:704
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v AllowTelemetry /t REG_DWORD /d 0 /f2⤵PID:452
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v AllowTelemetry /t REG_DWORD /d 0 /f2⤵PID:3384
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v ContentDeliveryAllowed /t REG_DWORD /d 0 /f2⤵PID:5640
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v OemPreInstalledAppsEnabled /t REG_DWORD /d 0 /f2⤵PID:4580
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v PreInstalledAppsEnabled /t REG_DWORD /d 0 /f2⤵PID:784
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v PreInstalledAppsEverEnabled /t REG_DWORD /d 0 /f2⤵PID:5960
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v SilentInstalledAppsEnabled /t REG_DWORD /d 0 /f2⤵PID:2664
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v SubscribedContent-338387Enabled /t REG_DWORD /d 0 /f2⤵PID:4728
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v SubscribedContent-338388Enabled /t REG_DWORD /d 0 /f2⤵PID:2748
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v SubscribedContent-338389Enabled /t REG_DWORD /d 0 /f2⤵PID:640
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v SubscribedContent-353698Enabled /t REG_DWORD /d 0 /f2⤵PID:2280
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v SystemPaneSuggestionsEnabled /t REG_DWORD /d 0 /f2⤵PID:4708
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\CloudContent" /v DisableWindowsConsumerFeatures /t REG_DWORD /d 1 /f2⤵PID:4984
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Siuf\Rules" /v NumberOfSIUFInPeriod /t REG_DWORD /d 0 /f2⤵PID:4856
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v DoNotShowFeedbackNotifications /t REG_DWORD /d 1 /f2⤵PID:5008
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Policies\Microsoft\Windows\CloudContent" /v DisableTailoredExperiencesWithDiagnosticData /t REG_DWORD /d 1 /f2⤵PID:2312
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\AdvertisingInfo" /v DisabledByGroupPolicy /t REG_DWORD /d 1 /f2⤵PID:1136
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /v Disabled /t REG_DWORD /d 1 /f2⤵PID:6064
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config" /v DODownloadMode /t REG_DWORD /d 1 /f2⤵PID:4120
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Remote Assistance" /v fAllowToGetHelp /t REG_DWORD /d 0 /f2⤵PID:1300
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\OperationStatusManager" /v EnthusiastMode /t REG_DWORD /d 1 /f2⤵PID:4264
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v ShowTaskViewButton /t REG_DWORD /d 0 /f2⤵PID:2928
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\People" /v PeopleBand /t REG_DWORD /d 0 /f2⤵PID:4760
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v LaunchTo /t REG_DWORD /d 1 /f2⤵PID:4780
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\FileSystem" /v LongPathsEnabled /t REG_DWORD /d 1 /f2⤵PID:5004
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DriverSearching" /v SearchOrderConfig /t REG_DWORD /d 1 /f2⤵PID:5368
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile" /v SystemResponsiveness /t REG_DWORD /d 0 /f2⤵PID:1340
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile" /v NetworkThrottlingIndex /t REG_DWORD /d 4294967295 /f2⤵PID:5724
-
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Desktop" /v MenuShowDelay /t REG_DWORD /d 1 /f2⤵PID:1912
-
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Desktop" /v AutoEndTasks /t REG_DWORD /d 1 /f2⤵PID:5240
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v ClearPageFileAtShutdown /t REG_DWORD /d 0 /f2⤵PID:5224
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\ControlSet001\Services\Ndu" /v Start /t REG_DWORD /d 2 /f2⤵PID:232
-
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Mouse" /v MouseHoverTime /t REG_SZ /d 400 /f2⤵PID:2520
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" /v IRPStackSize /t REG_DWORD /d 30 /f2⤵PID:2588
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Policies\Microsoft\Windows\Windows Feeds" /v EnableFeeds /t REG_DWORD /d 0 /f2⤵PID:1224
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Feeds" /v ShellFeedsTaskbarViewMode /t REG_DWORD /d 2 /f2⤵PID:5160
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v HideSCAMeetNow /t REG_DWORD /d 1 /f2⤵PID:4692
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "GPU Priority" /t REG_DWORD /d 8 /f2⤵PID:5184
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v Priority /t REG_DWORD /d 6 /f2⤵PID:4372
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Scheduling Category" /t REG_SZ /d High /f2⤵PID:4380
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\UserProfileEngagement" /v "ScoobeSystemSettingEnabled" /t REG_DWORD /d 0 /f2⤵PID:5216
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:4636
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {current} bootmenupolicy Legacy2⤵
- Modifies boot configuration data using bcdedit
PID:3316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v CurrentBuild 2>nul | findstr /r /c:"CurrentBuild"2⤵PID:3524
-
C:\Windows\system32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v CurrentBuild3⤵PID:1068
-
-
C:\Windows\system32\findstr.exefindstr /r /c:"CurrentBuild"3⤵PID:64
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile -Command "Start-Process taskmgr.exe -WindowStyle Hidden"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2116 -
C:\Windows\system32\Taskmgr.exe"C:\Windows\system32\Taskmgr.exe"3⤵PID:5688
-
-
-
C:\Windows\system32\timeout.exetimeout /t 22⤵
- Delays execution with timeout.exe
PID:888
-
-
C:\Windows\system32\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences2⤵PID:2300
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im taskmgr.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5408
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\TaskManager" /v Preferences /t REG_BINARY /d 0000000000000000000000000000000000000000000000000000000000000000 /f2⤵PID:1392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile -ExecutionPolicy Bypass -Command "Remove-Item -Path 'HKLM:\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\MyComputer\\NameSpace\\{0DB7E03F-FC29-4DC6-9020-FF41B59E513A}' -Recurse -ErrorAction SilentlyContinue"2⤵
- Hide Artifacts: Ignore Process Interrupts
- Suspicious use of AdjustPrivilegeToken
PID:5868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "(Get-CimInstance -ClassName Win32_PhysicalMemory | Measure-Object -Property Capacity -Sum).Sum / 1kb"2⤵PID:2636
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(Get-CimInstance -ClassName Win32_PhysicalMemory | Measure-Object -Property Capacity -Sum).Sum / 1kb"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control' -Name 'SvcHostSplitThresholdInKB' -Type DWord -Value 0 -Force"2⤵PID:4844
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Diagnosis\ETLLogs\AutoLogger" /deny SYSTEM:(OI)(CI)F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3148
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity" /v Enabled /t REG_DWORD /d 0 /f2⤵PID:3564
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:4972
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:4744
-
-
C:\Windows\system32\chcp.comchcp 4372⤵PID:4440
-
-
C:\Oneclick Tools\OOshutup10\OOSU10.exe"C:\Oneclick Tools\OOshutup10\OOSU10.exe" "C:\Oneclick Tools\OOshutup10\QuakedOOshutup10.cfg" /quiet2⤵
- Modifies security service
- Executes dropped EXE
- Modifies Control Panel
- Modifies registry class
- System policy modification
PID:1100
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:6080
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:4228
-
-
C:\Windows\system32\timeout.exetimeout 12⤵PID:3252
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:4392
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:2952
-
-
C:\Windows\system32\chcp.comchcp 4372⤵PID:5612
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\PimIndexMaintenanceSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:4000
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WinHttpAutoProxySvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2560
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\BcastDVRUserService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:3464
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\xbgm" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:3216
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\GameDVR" /v "AppCaptureEnabled" /t REG_DWORD /d "0" /f2⤵PID:5236
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\GameDVR" /v "AudioCaptureEnabled" /t REG_DWORD /d "0" /f2⤵PID:5860
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\GameDVR" /v "CursorCaptureEnabled" /t REG_DWORD /d "0" /f2⤵PID:4472
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\GameDVR" /v "MicrophoneCaptureEnabled" /t REG_DWORD /d "0" /f2⤵PID:1800
-
-
C:\Windows\system32\reg.exereg add "HKCU\System\GameConfigStore" /v "GameDVR_FSEBehavior" /t REG_DWORD /d "2" /f2⤵PID:4248
-
-
C:\Windows\system32\reg.exereg add "HKCU\System\GameConfigStore" /v "GameDVR_HonorUserFSEBehaviorMode" /t REG_DWORD /d "2" /f2⤵PID:3116
-
-
C:\Windows\system32\reg.exereg add "HKCU\System\GameConfigStore" /v "GameDVR_Enabled" /t REG_DWORD /d "0" /f2⤵PID:3168
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows\GameDVR" /v "AllowgameDVR" /t REG_DWORD /d "0" /f2⤵PID:2752
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\GameBar" /v "AutoGameModeEnabled" /t REG_DWORD /d "0" /f2⤵PID:3768
-
-
C:\Windows\system32\sc.exesc config wlidsvc start= disabled2⤵PID:2008
-
-
C:\Windows\system32\sc.exesc config DisplayEnhancementService start= disabled2⤵PID:2024
-
-
C:\Windows\system32\sc.exesc config DiagTrack start= disabled2⤵PID:1616
-
-
C:\Windows\system32\sc.exesc config DusmSvc start= disabled2⤵PID:2776
-
-
C:\Windows\system32\sc.exesc config TabletInputService start= disabled2⤵
- Launches sc.exe
PID:4140
-
-
C:\Windows\system32\sc.exesc config RetailDemo start= disabled2⤵PID:2268
-
-
C:\Windows\system32\sc.exesc config Fax start= disabled2⤵
- Launches sc.exe
PID:3828
-
-
C:\Windows\system32\sc.exesc config SharedAccess start= disabled2⤵PID:3308
-
-
C:\Windows\system32\sc.exesc config lfsvc start= disabled2⤵PID:5784
-
-
C:\Windows\system32\sc.exesc config WpcMonSvc start= disabled2⤵PID:6128
-
-
C:\Windows\system32\sc.exesc config SessionEnv start= disabled2⤵PID:1648
-
-
C:\Windows\system32\sc.exesc config MicrosoftEdgeElevationService start= disabled2⤵PID:3104
-
-
C:\Windows\system32\sc.exesc config edgeupdate start= disabled2⤵PID:1672
-
-
C:\Windows\system32\sc.exesc config edgeupdatem start= disabled2⤵PID:704
-
-
C:\Windows\system32\sc.exesc config autotimesvc start= disabled2⤵PID:452
-
-
C:\Windows\system32\sc.exesc config CscService start= disabled2⤵PID:3384
-
-
C:\Windows\system32\sc.exesc config TermService start= disabled2⤵PID:5640
-
-
C:\Windows\system32\sc.exesc config SensorDataService start= disabled2⤵PID:8
-
-
C:\Windows\system32\sc.exesc config SensorService start= disabled2⤵PID:1692
-
-
C:\Windows\system32\sc.exesc config SensrSvc start= disabled2⤵PID:5716
-
-
C:\Windows\system32\sc.exesc config shpamsvc start= disabled2⤵PID:1712
-
-
C:\Windows\system32\sc.exesc config diagnosticshub.standardcollector.service start= disabled2⤵PID:968
-
-
C:\Windows\system32\sc.exesc config PhoneSvc start= disabled2⤵PID:4196
-
-
C:\Windows\system32\sc.exesc config TapiSrv start= disabled2⤵PID:3648
-
-
C:\Windows\system32\sc.exesc config UevAgentService start= disabled2⤵PID:900
-
-
C:\Windows\system32\sc.exesc config WalletService start= disabled2⤵PID:4076
-
-
C:\Windows\system32\sc.exesc config TokenBroker start= disabled2⤵PID:4644
-
-
C:\Windows\system32\sc.exesc config WebClient start= disabled2⤵
- Launches sc.exe
PID:3068
-
-
C:\Windows\system32\sc.exesc config MixedRealityOpenXRSvc start= disabled2⤵
- Launches sc.exe
PID:4364
-
-
C:\Windows\system32\sc.exesc config stisvc start= disabled2⤵
- Launches sc.exe
PID:4200
-
-
C:\Windows\system32\sc.exesc config WbioSrvc start= disabled2⤵PID:5088
-
-
C:\Windows\system32\sc.exesc config icssvc start= disabled2⤵PID:1316
-
-
C:\Windows\system32\sc.exesc config Wecsvc start= disabled2⤵PID:536
-
-
C:\Windows\system32\sc.exesc config XboxGipSvc start= disabled2⤵PID:2200
-
-
C:\Windows\system32\sc.exesc config XblAuthManager start= disabled2⤵PID:4084
-
-
C:\Windows\system32\sc.exesc config XboxNetApiSvc start= disabled2⤵PID:3356
-
-
C:\Windows\system32\sc.exesc config XblGameSave start= disabled2⤵PID:5244
-
-
C:\Windows\system32\sc.exesc config SEMgrSvc start= disabled2⤵PID:4308
-
-
C:\Windows\system32\sc.exesc config iphlpsvc start= disabled2⤵
- Launches sc.exe
PID:5040
-
-
C:\Windows\system32\sc.exesc config Backupper Service start= disabled2⤵PID:4664
-
-
C:\Windows\system32\sc.exesc config BthAvctpSvc start= disabled2⤵PID:1312
-
-
C:\Windows\system32\sc.exesc config BDESVC start= disabled2⤵PID:5928
-
-
C:\Windows\system32\sc.exesc config cbdhsvc start= disabled2⤵PID:2000
-
-
C:\Windows\system32\sc.exesc config CDPSvc start= disabled2⤵PID:5384
-
-
C:\Windows\system32\sc.exesc config CDPUserSvc start= disabled2⤵PID:832
-
-
C:\Windows\system32\sc.exesc config DevQueryBroker start= disabled2⤵PID:4796
-
-
C:\Windows\system32\sc.exesc config DevicesFlowUserSvc start= disabled2⤵PID:3340
-
-
C:\Windows\system32\sc.exesc config dmwappushservice start= disabled2⤵PID:5136
-
-
C:\Windows\system32\sc.exesc config DispBrokerDesktopSvc start= disabled2⤵PID:5148
-
-
C:\Windows\system32\sc.exesc config TrkWks start= disabled2⤵PID:3328
-
-
C:\Windows\system32\sc.exesc config dLauncherLoopback start= disabled2⤵PID:4736
-
-
C:\Windows\system32\sc.exesc config EFS start= disabled2⤵PID:2652
-
-
C:\Windows\system32\sc.exesc config fdPHost start= disabled2⤵PID:1232
-
-
C:\Windows\system32\sc.exesc config FDResPub start= disabled2⤵
- Launches sc.exe
PID:6012
-
-
C:\Windows\system32\sc.exesc config IKEEXT start= disabled2⤵PID:5168
-
-
C:\Windows\system32\sc.exesc config NPSMSvc start= disabled2⤵PID:4896
-
-
C:\Windows\system32\sc.exesc config WPDBusEnum start= disabled2⤵PID:4188
-
-
C:\Windows\system32\sc.exesc config PcaSvc start= disabled2⤵PID:2616
-
-
C:\Windows\system32\sc.exesc config RasMan start= disabled2⤵PID:404
-
-
C:\Windows\system32\sc.exesc config RetailDemo start=disabled2⤵PID:5992
-
-
C:\Windows\system32\sc.exesc config SstpSvc start=disabled2⤵PID:2832
-
-
C:\Windows\system32\sc.exesc config ShellHWDetection start= disabled2⤵PID:3652
-
-
C:\Windows\system32\sc.exesc config SSDPSRV start= disabled2⤵PID:64
-
-
C:\Windows\system32\sc.exesc config SysMain start= disabled2⤵PID:792
-
-
C:\Windows\system32\sc.exesc config OneSyncSvc start= disabled2⤵PID:4716
-
-
C:\Windows\system32\sc.exesc config lmhosts start= disabled2⤵PID:5352
-
-
C:\Windows\system32\sc.exesc config UserDataSvc start= disabled2⤵PID:1320
-
-
C:\Windows\system32\sc.exesc config UnistoreSvc start= disabled2⤵PID:4112
-
-
C:\Windows\system32\sc.exesc config Wcmsvc start= disabled2⤵PID:3516
-
-
C:\Windows\system32\sc.exesc config FontCache start= disabled2⤵PID:1864
-
-
C:\Windows\system32\sc.exesc config W32Time start= disabled2⤵PID:2716
-
-
C:\Windows\system32\sc.exesc config tzautoupdate start= disabled2⤵PID:2116
-
-
C:\Windows\system32\sc.exesc config DsSvc start= disabled2⤵PID:5688
-
-
C:\Windows\system32\sc.exesc config DevicesFlowUserSvc_5f1ad start= disabled2⤵PID:4332
-
-
C:\Windows\system32\sc.exesc config diagsvc start= disabled2⤵PID:4028
-
-
C:\Windows\system32\sc.exesc config DialogBlockingService start= disabled2⤵PID:5156
-
-
C:\Windows\system32\sc.exesc config PimIndexMaintenanceSvc_5f1ad start= disabled2⤵PID:5192
-
-
C:\Windows\system32\sc.exesc config MessagingService_5f1ad start= disabled2⤵PID:3536
-
-
C:\Windows\system32\sc.exesc config AppVClient start= disabled2⤵PID:6044
-
-
C:\Windows\system32\sc.exesc config MsKeyboardFilter start= disabled2⤵PID:4292
-
-
C:\Windows\system32\sc.exesc config NetTcpPortSharing start= disabled2⤵PID:5832
-
-
C:\Windows\system32\sc.exesc config ssh-agent start= disabled2⤵PID:3164
-
-
C:\Windows\system32\sc.exesc config SstpSvc start= disabled2⤵
- Launches sc.exe
PID:1392
-
-
C:\Windows\system32\sc.exesc config OneSyncSvc_5f1ad start= disabled2⤵PID:1700
-
-
C:\Windows\system32\sc.exesc config wercplsupport start= disabled2⤵PID:5488
-
-
C:\Windows\system32\sc.exesc config WMPNetworkSvc start= disabled2⤵PID:400
-
-
C:\Windows\system32\sc.exesc config WerSvc start= disabled2⤵PID:2556
-
-
C:\Windows\system32\sc.exesc config WpnUserService_5f1ad start= disabled2⤵PID:4696
-
-
C:\Windows\system32\sc.exesc config WinHttpAutoProxySvc start= disabled2⤵PID:2220
-
-
C:\Windows\system32\schtasks.exeschtasks /DELETE /TN "AMDInstallLauncher" /f2⤵PID:3244
-
-
C:\Windows\system32\schtasks.exeschtasks /DELETE /TN "AMDLinkUpdate" /f2⤵PID:4536
-
-
C:\Windows\system32\schtasks.exeschtasks /DELETE /TN "AMDRyzenMasterSDKTask" /f2⤵PID:5648
-
-
C:\Windows\system32\schtasks.exeschtasks /DELETE /TN "Driver Easy Scheduled Scan" /f2⤵PID:5868
-
-
C:\Windows\system32\schtasks.exeschtasks /DELETE /TN "ModifyLinkUpdate" /f2⤵PID:5252
-
-
C:\Windows\system32\schtasks.exeschtasks /DELETE /TN "SoftMakerUpdater" /f2⤵PID:1776
-
-
C:\Windows\system32\schtasks.exeschtasks /DELETE /TN "StartCN" /f2⤵PID:4572
-
-
C:\Windows\system32\schtasks.exeschtasks /DELETE /TN "StartDVR" /f2⤵PID:2248
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /Disable2⤵PID:1396
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Application Experience\PcaPatchDbTask" /Disable2⤵PID:3512
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Application Experience\ProgramDataUpdater" /Disable2⤵PID:4552
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Application Experience\StartupAppTask" /Disable2⤵PID:4592
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Autochk\Proxy" /Disable2⤵PID:2660
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Customer Experience Improvement Program\Consolidator" /Disable2⤵PID:5792
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Customer Experience Improvement Program\UsbCeip" /Disable2⤵PID:3348
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Defrag\ScheduledDefrag" /Disable2⤵PID:4804
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Device Information\Device" /Disable2⤵PID:4608
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Device Information\Device User" /Disable2⤵PID:2936
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Diagnosis\RecommendedTroubleshootingScanner" /Disable2⤵PID:1404
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Diagnosis\Scheduled" /Disable2⤵PID:600
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\DiskCleanup\SilentCleanup" /Disable2⤵PID:5800
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector" /Disable2⤵PID:1980
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\DiskFootprint\Diagnostics" /Disable2⤵PID:3884
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\DiskFootprint\StorageSense" /Disable2⤵PID:5844
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\DUSM\dusmtask" /Disable2⤵PID:6004
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\EnterpriseMgmt\MDMMaintenenceTask" /Disable2⤵PID:5892
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Feedback\Siuf\DmClient" /Disable2⤵PID:6088
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Feedback\Siuf\DmClientOnScenarioDownload" /Disable2⤵PID:236
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\FileHistory\File History (maintenance mode)" /Disable2⤵PID:4684
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Flighting\FeatureConfig\ReconcileFeatures" /Disable2⤵PID:4436
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Flighting\FeatureConfig\UsageDataFlushing" /Disable2⤵PID:5596
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Flighting\FeatureConfig\UsageDataReporting" /Disable2⤵PID:764
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Flighting\OneSettings\RefreshCache" /Disable2⤵PID:5912
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Input\LocalUserSyncDataAvailable" /Disable2⤵PID:5636
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Input\MouseSyncDataAvailable" /Disable2⤵PID:6068
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Input\PenSyncDataAvailable" /Disable2⤵PID:4668
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Input\TouchpadSyncDataAvailable" /Disable2⤵PID:2844
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\International\Synchronize Language Settings" /Disable2⤵PID:5348
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\LanguageComponentsInstaller\Installation" /Disable2⤵PID:5360
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\LanguageComponentsInstaller\ReconcileLanguageResources" /Disable2⤵PID:3252
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\LanguageComponentsInstaller\Uninstallation" /Disable2⤵PID:4392
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\License Manager\TempSignedLicenseExchange" /Disable2⤵PID:2952
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\License Manager\TempSignedLicenseExchange" /Disable2⤵PID:5612
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Management\Provisioning\Cellular" /Disable2⤵PID:4000
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Management\Provisioning\Logon" /Disable2⤵PID:2560
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Maintenance\WinSAT" /Disable2⤵PID:692
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Maps\MapsToastTask" /Disable2⤵PID:3312
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Maps\MapsUpdateTask" /Disable2⤵PID:468
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Mobile Broadband Accounts\MNO Metadata Parser" /Disable2⤵PID:3852
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\MUI\LPRemove" /Disable2⤵PID:3396
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\NetTrace\GatherNetworkInfo" /Disable2⤵PID:2904
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\PI\Sqm-Tasks" /Disable2⤵PID:3584
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Power Efficiency Diagnostics\AnalyzeSystem" /Disable2⤵PID:6120
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\PushToInstall\Registration" /Disable2⤵PID:4916
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Ras\MobilityManager" /Disable2⤵PID:320
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\RecoveryEnvironment\VerifyWinRE" /Disable2⤵PID:4172
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\RemoteAssistance\RemoteAssistanceTask" /Disable2⤵PID:5180
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\RetailDemo\CleanupOfflineContent" /Disable2⤵PID:4176
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Servicing\StartComponentCleanup" /Disable2⤵PID:4424
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\SettingSync\NetworkStateChangeTask" /Disable2⤵PID:3064
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Setup\SetupCleanupTask" /Disable2⤵PID:4512
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Setup\SnapshotCleanupTask" /Disable2⤵PID:1124
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\SpacePort\SpaceAgentTask" /Disable2⤵PID:5924
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\SpacePort\SpaceManagerTask" /Disable2⤵PID:3108
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Speech\SpeechModelDownloadTask" /Disable2⤵PID:3292
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Storage Tiers Management\Storage Tiers Management Initialization" /Disable2⤵PID:3092
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Sysmain\ResPriStaticDbSync" /Disable2⤵PID:324
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Sysmain\WsSwapAssessmentTask" /Disable2⤵PID:3712
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Task Manager\Interactive" /Disable2⤵PID:4312
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Time Synchronization\ForceSynchronizeTime" /Disable2⤵PID:1080
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Time Synchronization\SynchronizeTime" /Disable2⤵PID:4420
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Time Zone\SynchronizeTimeZone" /Disable2⤵PID:992
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\TPM\Tpm-HASCertRetr" /Disable2⤵PID:5840
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\TPM\Tpm-Maintenance" /Disable2⤵PID:944
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\UPnP\UPnPHostConfig" /Disable2⤵PID:3488
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\User Profile Service\HiveUploadTask" /Disable2⤵PID:1452
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\WDI\ResolutionHost" /Disable2⤵PID:5756
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Filtering Platform\BfeOnServiceStartTypeChange" /Disable2⤵PID:772
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\WOF\WIM-Hash-Management" /Disable2⤵PID:1984
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\WOF\WIM-Hash-Validation" /Disable2⤵PID:2280
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Work Folders\Work Folders Logon Synchronization" /Disable2⤵PID:3028
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Work Folders\Work Folders Maintenance Work" /Disable2⤵PID:2372
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Workplace Join\Automatic-Device-Join" /Disable2⤵PID:2332
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\WwanSvc\NotificationTask" /Disable2⤵PID:4748
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\WwanSvc\OobeDiscovery" /Disable2⤵PID:2312
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\XblGameSave\XblGameSaveTask" /Disable2⤵PID:3140
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:5816
-
-
C:\Windows\system32\sc.exesc stop uhssvc2⤵PID:952
-
-
C:\Windows\system32\sc.exesc stop upfc2⤵PID:2196
-
-
C:\Windows\system32\sc.exesc stop PushToInstall2⤵PID:4032
-
-
C:\Windows\system32\sc.exesc stop BITS2⤵PID:2272
-
-
C:\Windows\system32\sc.exesc stop InstallService2⤵
- Launches sc.exe
PID:5396
-
-
C:\Windows\system32\sc.exesc stop uhssvc2⤵PID:4680
-
-
C:\Windows\system32\sc.exesc stop UsoSvc2⤵PID:2392
-
-
C:\Windows\system32\sc.exesc stop wuauserv2⤵PID:5064
-
-
C:\Windows\system32\sc.exesc stop LanmanServer2⤵PID:5808
-
-
C:\Windows\system32\sc.exesc config BITS start= disabled2⤵PID:1856
-
-
C:\Windows\system32\sc.exesc config InstallService start= disabled2⤵PID:2000
-
-
C:\Windows\system32\sc.exesc config uhssvc start= disabled2⤵
- Launches sc.exe
PID:5384
-
-
C:\Windows\system32\sc.exesc config UsoSvc start= disabled2⤵
- Launches sc.exe
PID:832
-
-
C:\Windows\system32\sc.exesc config wuauserv start= disabled2⤵PID:4796
-
-
C:\Windows\system32\sc.exesc config LanmanServer start= disabled2⤵PID:3340
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DoSvc" /v Start /t reg_dword /d 4 /f2⤵PID:5136
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\InstallService" /v Start /t reg_dword /d 4 /f2⤵PID:5148
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsoSvc" /v Start /t reg_dword /d 4 /f2⤵PID:3328
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv" /v Start /t reg_dword /d 4 /f2⤵
- Modifies security service
PID:4736
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /v Start /t reg_dword /d 4 /f2⤵PID:2652
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BITS" /v Start /t reg_dword /d 4 /f2⤵PID:1232
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\upfc" /v Start /t reg_dword /d 4 /f2⤵PID:6012
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\uhssvc" /v Start /t reg_dword /d 4 /f2⤵PID:5168
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ossrs" /v Start /t reg_dword /d 4 /f2⤵PID:4896
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /v "DeferUpdatePeriod" /t REG_DWORD /d "1" /f2⤵PID:4188
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /v "DeferUpgrade" /t REG_DWORD /d "1" /f2⤵PID:2616
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /v "DeferUpgradePeriod" /t REG_DWORD /d "1" /f2⤵PID:444
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /v "DisableWindowsUpdateAccess" /t REG_DWORD /d "1" /f2⤵PID:1068
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\InstallService\ScanForUpdates" /Disable2⤵PID:4232
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\InstallService\ScanForUpdatesAsUser" /Disable2⤵PID:2120
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\InstallService\SmartRetry" /Disable2⤵PID:5132
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\InstallService\WakeUpAndContinueUpdates" /Disable2⤵PID:1524
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\InstallService\WakeUpAndScanForUpdates" /Disable2⤵PID:1732
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\UpdateOrchestrator\Report policies" /Disable2⤵PID:4712
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\UpdateOrchestrator\Schedule Scan" /Disable2⤵PID:688
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\UpdateOrchestrator\Schedule Scan Static Task" /Disable2⤵PID:2044
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\UpdateOrchestrator\UpdateModelTask" /Disable2⤵PID:1756
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\UpdateOrchestrator\USO_UxBroker" /Disable2⤵PID:560
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\WaaSMedic\PerformRemediation" /Disable2⤵PID:3052
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\WindowsUpdate\Scheduled Start" /Disable2⤵PID:1044
-
-
C:\Windows\system32\timeout.exetimeout 12⤵PID:5568
-
-
C:\Windows\system32\sc.exesc config RemoteRegistry start= disabled2⤵PID:2076
-
-
C:\Windows\system32\sc.exesc config RemoteAccess start= disabled2⤵PID:856
-
-
C:\Windows\system32\sc.exesc config WinRM start= disabled2⤵PID:5736
-
-
C:\Windows\system32\sc.exesc config RmSvc start= disabled2⤵PID:5392
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:2052
-
-
C:\Windows\system32\sc.exesc config PrintNotify start= disabled2⤵PID:5704
-
-
C:\Windows\system32\sc.exesc config Spooler start= disabled2⤵PID:5376
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Printing\EduPrintProv" /Disable2⤵PID:4468
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Printing\PrinterCleanupTask" /Disable2⤵PID:5408
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:1352
-
-
C:\Windows\system32\sc.exesc config BTAGService start= disabled2⤵PID:1720
-
-
C:\Windows\system32\sc.exesc config bthserv start= disabled2⤵PID:5320
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:2148
-
-
C:\Windows\system32\sc.exesc config NlaSvc start= disabled2⤵PID:4696
-
-
C:\Windows\system32\sc.exesc config LanmanWorkstation start= disabled2⤵PID:2220
-
-
C:\Windows\system32\sc.exesc config BFE start= demand2⤵PID:6104
-
-
C:\Windows\system32\sc.exesc config Dnscache start= demand2⤵PID:2824
-
-
C:\Windows\system32\sc.exesc config WinHttpAutoProxySvc start= demand2⤵PID:1348
-
-
C:\Windows\system32\sc.exesc config Dhcp start= auto2⤵PID:3016
-
-
C:\Windows\system32\sc.exesc config DPS start= auto2⤵PID:4528
-
-
C:\Windows\system32\sc.exesc config lmhosts start= disabled2⤵PID:5332
-
-
C:\Windows\system32\sc.exesc config nsi start= auto2⤵PID:5200
-
-
C:\Windows\system32\sc.exesc config Wcmsvc start= disabled2⤵PID:2420
-
-
C:\Windows\system32\sc.exesc config Winmgmt start= auto2⤵
- Launches sc.exe
PID:6132
-
-
C:\Windows\system32\sc.exesc config WlanSvc start= demand2⤵PID:2640
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows\NetworkConnectivityStatusIndicator" /v "NoActiveProbe" /t REG_DWORD /d "1" /f2⤵PID:2712
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\NlaSvc\Parameters\Internet" /v "EnableActiveProbing" /t REG_DWORD /d "0" /f2⤵PID:1304
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\WlanSvc\CDSSync" /Disable2⤵PID:3992
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\WCM\WiFiTask" /Disable2⤵PID:3484
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\NlaSvc\WiFiTask" /Disable2⤵PID:2012
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\DUSM\dusmtask" /Disable2⤵PID:4480
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:1476
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:4348
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:5096
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:1516
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:5292
-
-
C:\Windows\system32\chcp.comchcp 4372⤵PID:4280
-
-
C:\Windows\system32\timeout.exetimeout 12⤵PID:5060
-
-
C:\Windows\system32\sc.exesc config ALG start=disabled2⤵PID:3668
-
-
C:\Windows\system32\sc.exesc config AJRouter start=disabled2⤵PID:2656
-
-
C:\Windows\system32\sc.exesc config XblAuthManager start=disabled2⤵PID:4744
-
-
C:\Windows\system32\sc.exesc config XblGameSave start=disabled2⤵PID:1932
-
-
C:\Windows\system32\sc.exesc config XboxNetApiSvc start=disabled2⤵
- Launches sc.exe
PID:4400
-
-
C:\Windows\system32\sc.exesc config WSearch start=disabled2⤵PID:1172
-
-
C:\Windows\system32\sc.exesc config lfsvc start=disabled2⤵PID:372
-
-
C:\Windows\system32\sc.exesc config RemoteRegistry start=disabled2⤵PID:1104
-
-
C:\Windows\system32\sc.exesc config WpcMonSvc start=disabled2⤵PID:4432
-
-
C:\Windows\system32\sc.exesc config SEMgrSvc start=disabled2⤵
- Launches sc.exe
PID:3876
-
-
C:\Windows\system32\sc.exesc config SCardSvr start=disabled2⤵PID:1432
-
-
C:\Windows\system32\sc.exesc config Netlogon start=disabled2⤵PID:2648
-
-
C:\Windows\system32\sc.exesc config CscService start=disabled2⤵PID:5280
-
-
C:\Windows\system32\sc.exesc config icssvc start=disabled2⤵PID:1508
-
-
C:\Windows\system32\sc.exesc config wisvc start=disabled2⤵PID:1716
-
-
C:\Windows\system32\sc.exesc config RetailDemo start=disabled2⤵PID:5188
-
-
C:\Windows\system32\sc.exesc config WalletService start=disabled2⤵PID:1192
-
-
C:\Windows\system32\sc.exesc config Fax start=disabled2⤵PID:3788
-
-
C:\Windows\system32\sc.exesc config WbioSrvc start=disabled2⤵PID:1344
-
-
C:\Windows\system32\sc.exesc config iphlpsvc start=disabled2⤵
- Launches sc.exe
PID:2456
-
-
C:\Windows\system32\sc.exesc config wcncsvc start=disabled2⤵
- Launches sc.exe
PID:3684
-
-
C:\Windows\system32\sc.exesc config fhsvc start=disabled2⤵PID:3704
-
-
C:\Windows\system32\sc.exesc config PhoneSvc start=disabled2⤵PID:4152
-
-
C:\Windows\system32\sc.exesc config seclogon start=disabled2⤵PID:2360
-
-
C:\Windows\system32\sc.exesc config FrameServer start=disabled2⤵PID:5316
-
-
C:\Windows\system32\sc.exesc config WbioSrvc start=disabled2⤵PID:2460
-
-
C:\Windows\system32\sc.exesc config StiSvc start=disabled2⤵PID:1168
-
-
C:\Windows\system32\sc.exesc config PcaSvc start=disabled2⤵PID:5144
-
-
C:\Windows\system32\sc.exesc config DPS start=disabled2⤵PID:2720
-
-
C:\Windows\system32\sc.exesc config MapsBroker start=disabled2⤵PID:3636
-
-
C:\Windows\system32\sc.exesc config bthserv start=disabled2⤵PID:3428
-
-
C:\Windows\system32\sc.exesc config BDESVC start=disabled2⤵PID:4396
-
-
C:\Windows\system32\sc.exesc config BthAvctpSvc start=disabled2⤵PID:648
-
-
C:\Windows\system32\sc.exesc config WpcMonSvc start=disabled2⤵PID:1580
-
-
C:\Windows\system32\sc.exesc config DiagTrack start=disabled2⤵PID:1336
-
-
C:\Windows\system32\sc.exesc config CertPropSvc start=disabled2⤵PID:5624
-
-
C:\Windows\system32\sc.exesc config WdiServiceHost start=disabled2⤵PID:5956
-
-
C:\Windows\system32\sc.exesc config lmhosts start=disabled2⤵PID:6060
-
-
C:\Windows\system32\sc.exesc config WdiSystemHost start=disabled2⤵PID:4900
-
-
C:\Windows\system32\sc.exesc config TrkWks start=disabled2⤵PID:3304
-
-
C:\Windows\system32\sc.exesc config WerSvc start=disabled2⤵PID:3848
-
-
C:\Windows\system32\sc.exesc config TabletInputService start=disabled2⤵PID:3752
-
-
C:\Windows\system32\sc.exesc config EntAppSvc start=disabled2⤵PID:3964
-
-
C:\Windows\system32\sc.exesc config Spooler start=disabled2⤵PID:3288
-
-
C:\Windows\system32\sc.exesc config BcastDVRUserService start=disabled2⤵PID:5788
-
-
C:\Windows\system32\sc.exesc config WMPNetworkSvc start=disabled2⤵PID:5264
-
-
C:\Windows\system32\sc.exesc config diagnosticshub.standardcollector.service start=disabled2⤵PID:516
-
-
C:\Windows\system32\sc.exesc config DmEnrollmentSvc start=disabled2⤵PID:4648
-
-
C:\Windows\system32\sc.exesc config PNRPAutoReg start=disabled2⤵
- Launches sc.exe
PID:4556
-
-
C:\Windows\system32\sc.exesc config wlidsvc start=disabled2⤵PID:1788
-
-
C:\Windows\system32\sc.exesc config AXInstSV start=disabled2⤵PID:8
-
-
C:\Windows\system32\sc.exesc config lfsvc start=disabled2⤵PID:784
-
-
C:\Windows\system32\sc.exesc config NcbService start=disabled2⤵
- Launches sc.exe
PID:5960
-
-
C:\Windows\system32\sc.exesc config DeviceAssociationService start=disabled2⤵PID:636
-
-
C:\Windows\system32\sc.exesc config StorSvc start=disabled2⤵PID:4728
-
-
C:\Windows\system32\sc.exesc config TieringEngineService start=disabled2⤵PID:2748
-
-
C:\Windows\system32\sc.exesc config DPS start=disabled2⤵PID:556
-
-
C:\Windows\system32\sc.exesc config Themes start=disabled2⤵PID:3180
-
-
C:\Windows\system32\sc.exesc config AppReadiness start=disabled2⤵PID:4708
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:4984
-
-
C:\Windows\system32\sc.exesc config HvHost start=disabled2⤵PID:2372
-
-
C:\Windows\system32\sc.exesc config vmickvpexchange start=disabled2⤵PID:4748
-
-
C:\Windows\system32\sc.exesc config vmicguestinterface start=disabled2⤵PID:2312
-
-
C:\Windows\system32\sc.exesc config vmicshutdown start=disabled2⤵PID:3140
-
-
C:\Windows\system32\sc.exesc config vmicheartbeat start=disabled2⤵PID:5816
-
-
C:\Windows\system32\sc.exesc config vmicvmsession start=disabled2⤵PID:952
-
-
C:\Windows\system32\sc.exesc config vmicrdv start=disabled2⤵PID:2196
-
-
C:\Windows\system32\sc.exesc config vmictimesync start=disabled2⤵PID:4032
-
-
C:\Windows\system32\sc.exesc config vmicvss start=disabled2⤵
- Launches sc.exe
PID:2272
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:5396
-
-
C:\Windows\system32\sc.exesc config edgeupdate start=disabled2⤵
- Launches sc.exe
PID:1176
-
-
C:\Windows\system32\sc.exesc config edgeupdatem start=disabled2⤵PID:5004
-
-
C:\Windows\system32\sc.exesc config GoogleChromeElevationService start=disabled2⤵
- Launches sc.exe
PID:5368
-
-
C:\Windows\system32\sc.exesc config gupdate start=disabled2⤵
- Launches sc.exe
PID:4776
-
-
C:\Windows\system32\sc.exesc config gupdatem start=disabled2⤵
- Launches sc.exe
PID:3084
-
-
C:\Windows\system32\sc.exesc config BraveElevationService start=disabled2⤵PID:3036
-
-
C:\Windows\system32\sc.exesc config brave start=disabled2⤵
- Launches sc.exe
PID:5928
-
-
C:\Windows\system32\sc.exesc config bravem start=disabled2⤵PID:1872
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:664
-
-
C:\Windows\system32\sc.exesc config NcbService start=disabled2⤵PID:2000
-
-
C:\Windows\system32\sc.exesc config jhi_service start=disabled2⤵
- Launches sc.exe
PID:5384
-
-
C:\Windows\system32\sc.exesc config WMIRegistrationService start=disabled2⤵PID:832
-
-
C:\Windows\system32\sc.exesc config "Intel(R) TPM Provisioning Service" start=disabled2⤵PID:4796
-
-
C:\Windows\system32\sc.exesc config "Intel(R) Platform License Manager Service" start=disabled2⤵PID:3340
-
-
C:\Windows\system32\sc.exesc config ipfsvc start=disabled2⤵PID:5136
-
-
C:\Windows\system32\sc.exesc config igccservice start=disabled2⤵PID:5884
-
-
C:\Windows\system32\sc.exesc config cplspcon start=disabled2⤵PID:4656
-
-
C:\Windows\system32\sc.exesc config esifsvc start=disabled2⤵PID:5184
-
-
C:\Windows\system32\sc.exesc config LMS start=disabled2⤵PID:4372
-
-
C:\Windows\system32\sc.exesc config ibtsiva start=disabled2⤵
- Launches sc.exe
PID:4380
-
-
C:\Windows\system32\sc.exesc config IntelAudioService start=disabled2⤵
- Launches sc.exe
PID:4640
-
-
C:\Windows\system32\sc.exesc config "Intel(R) Capability Licensing Service TCP IP Interface" start=disabled2⤵PID:4604
-
-
C:\Windows\system32\sc.exesc config cphs start=disabled2⤵PID:5552
-
-
C:\Windows\system32\sc.exesc config DSAService start=disabled2⤵PID:3624
-
-
C:\Windows\system32\sc.exesc config DSAUpdateService start=disabled2⤵PID:2472
-
-
C:\Windows\system32\sc.exesc config igfxCUIService2.0.0.0 start=disabled2⤵PID:460
-
-
C:\Windows\system32\sc.exesc config RstMwService start=disabled2⤵PID:5104
-
-
C:\Windows\system32\sc.exesc config "Intel(R) SUR QC SAM" start=disabled2⤵PID:3316
-
-
C:\Windows\system32\sc.exesc config SystemUsageReportSvc_QUEENCREEK start=disabled2⤵PID:3772
-
-
C:\Windows\system32\sc.exesc config iaStorAfsService start=disabled2⤵
- Launches sc.exe
PID:2240
-
-
C:\Oneclick Tools\NSudo\NSudoLG.exe"C:\Oneclick Tools\NSudo\NSudoLG.exe" -ShowWindowMode:hide -U:T -P:E "C:\Oneclick Tools\Amd\AMD.bat"2⤵
- Executes dropped EXE
PID:64
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:1768
-
-
C:\Oneclick Tools\NSudo\NSudoLG.exe"C:\Oneclick Tools\NSudo\NSudoLG.exe" -ShowWindowMode:hide -U:T -P:E "C:\Oneclick Tools\Sound\Sound.bat"2⤵
- Executes dropped EXE
PID:60
-
-
C:\Windows\system32\sc.exesc config HPAppHelperCap start=disabled2⤵PID:3692
-
-
C:\Windows\system32\sc.exesc config HPDiagsCap start=disabled2⤵PID:5356
-
-
C:\Windows\system32\sc.exesc config HpTouchpointAnalyticsService start=disabled2⤵PID:2892
-
-
C:\Windows\system32\sc.exesc config HPNetworkCap start=disabled2⤵PID:4304
-
-
C:\Windows\system32\sc.exesc config HPOmenCap start=disabled2⤵PID:4732
-
-
C:\Windows\system32\sc.exesc config HPSysInfoCap start=disabled2⤵PID:1044
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im spd.exe2⤵
- Kills process with taskkill
PID:4964
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im EasyTuneEngineService.exe2⤵
- Kills process with taskkill
PID:564
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im GraphicsCardEngine.exe2⤵
- Kills process with taskkill
PID:5904
-
-
C:\Windows\system32\net.exenet stop "cFosSpeedS"2⤵PID:856
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "cFosSpeedS"3⤵PID:5736
-
-
-
C:\Windows\system32\net.exenet stop "GigabyteUpdateService"2⤵PID:5392
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "GigabyteUpdateService"3⤵PID:6044
-
-
-
C:\Windows\system32\sc.exesc config cFosSpeedS start=disabled2⤵PID:5880
-
-
C:\Windows\system32\sc.exesc config GigabyteUpdateService start=disabled2⤵PID:4128
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im CCleaner64.exe2⤵
- Kills process with taskkill
PID:3164
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im CCleanerPerformanceOptimizerService.exe2⤵
- Kills process with taskkill
PID:2868
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im CCleanerBrowser.exe2⤵
- Kills process with taskkill
PID:5488
-
-
C:\Windows\system32\net.exenet stop "ccleaner"2⤵PID:2628
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "ccleaner"3⤵PID:2556
-
-
-
C:\Windows\system32\net.exenet stop "ccleanerm"2⤵PID:5988
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "ccleanerm"3⤵PID:4768
-
-
-
C:\Windows\system32\net.exenet stop "CCleanerPerformanceOptimizerService"2⤵PID:5304
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "CCleanerPerformanceOptimizerService"3⤵PID:5648
-
-
-
C:\Windows\system32\sc.exesc config ccleaner start=disabled2⤵PID:4908
-
-
C:\Windows\system32\sc.exesc config ccleanerm start=disabled2⤵PID:5468
-
-
C:\Windows\system32\sc.exesc config CCleanerPerformanceOptimizerService start=disabled2⤵PID:4532
-
-
C:\Windows\system32\sc.exesc config logi_lamparray_service start=disabled2⤵PID:4572
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:2248
-
-
C:\Oneclick Tools\NSudo\NSudoLG.exe"C:\Oneclick Tools\NSudo\NSudoLG.exe" -ShowWindowMode:hide -U:T -P:E "C:\Oneclick Tools\Orca\Orca.bat"2⤵
- Executes dropped EXE
PID:1228
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "GoogleUpdateTaskMachineCore{9C99738B-B026-4A33-A16D-7CCD7650D527}" /Disable2⤵PID:2640
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "GoogleUpdateTaskMachineUA{2E0C9FAD-7C87-42A8-8EFF-986A5662B894}" /Disable2⤵PID:2712
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Opera GX scheduled Autoupdate 1711926802" /Disable2⤵PID:1304
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "BraveSoftwareUpdateTaskMachineCore{A8A54493-B843-4D11-BA1F-30C26E9F10BE}" /Disable2⤵PID:3992
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "BraveSoftwareUpdateTaskMachineUA{FF1E0511-D7AF-4DB6-8A41-DC39EA60EC93}" /Disable2⤵PID:3484
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "CCleaner Update" /Disable2⤵PID:4812
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "CCleanerCrashReporting" /Disable2⤵PID:2232
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "CCleanerUpdateTaskMachineCore" /Disable2⤵PID:4444
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "CCleanerUpdateTaskMachineUA" /Disable2⤵PID:5588
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\capabilityaccessmanager" /Disable2⤵PID:5096
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Setup\SetupCleanupTask" /Disable2⤵PID:1516
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Setup\SnapshotCleanupTask" /Disable2⤵PID:5292
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Shell\FamilySafetyMonitor" /Disable2⤵PID:4280
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Shell\FamilySafetyRefreshTask" /Disable2⤵PID:5060
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Shell\ThemesSyncedImageDownload" /Disable2⤵PID:3668
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Shell\UpdateUserPictureTask" /Disable2⤵PID:2656
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\.NET Framework\.NET Framework NGEN v4.0.30319" /Disable2⤵PID:4744
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\.NET Framework\.NET Framework NGEN v4.0.30319 64" /Disable2⤵PID:1932
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\.NET Framework\.NET Framework NGEN v4.0.30319 64 Critical" /Disable2⤵PID:4400
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\.NET Framework\.NET Framework NGEN v4.0.30319 Critical" /Disable2⤵PID:1172
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Application Experience\SdbinstMergeDbTask" /Disable2⤵PID:372
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Printing\PrintJobCleanupTask" /Disable2⤵PID:1104
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "GoogleUpdateTaskMachineCore{9C99738B-B026-4A33-A16D-7CCD7650D527}" /F2⤵PID:4432
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "GoogleUpdateTaskMachineUA{2E0C9FAD-7C87-42A8-8EFF-986A5662B894}" /F2⤵PID:3876
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Opera GX scheduled Autoupdate 1711926802" /F2⤵PID:1432
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "BraveSoftwareUpdateTaskMachineCore{A8A54493-B843-4D11-BA1F-30C26E9F10BE}" /F2⤵PID:2648
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "BraveSoftwareUpdateTaskMachineUA{FF1E0511-D7AF-4DB6-8A41-DC39EA60EC93}" /F2⤵PID:5280
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "CCleaner Update" /F2⤵PID:1508
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "CCleanerCrashReporting" /F2⤵PID:1716
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "CCleanerUpdateTaskMachineCore" /F2⤵PID:5188
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "CCleanerUpdateTaskMachineUA" /F2⤵PID:1192
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:3788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "get-appxpackage Microsoft.GamingServices | remove-AppxPackage -allusers"2⤵
- Command and Scripting Interpreter: PowerShell
PID:1344
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:5308
-
-
C:\Windows\system32\takeown.exetakeown /F "C:\Windows\System32\GameBarPresenceWriter.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3168
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\GameBarPresenceWriter.exe" /grant administrators:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2752
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:3768
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im msedge.exe2⤵
- Kills process with taskkill
PID:2008
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im msedge.exe /fi "IMAGENAME eq msedge.exe"2⤵
- Kills process with taskkill
PID:5180
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im msedge.exe /fi "IMAGENAME eq msedge.exe"2⤵
- Kills process with taskkill
PID:1212
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:6060
-
-
C:\Windows\system32\taskkill.exetaskkill.exe /F /IM "OneDrive.exe"2⤵
- Kills process with taskkill
PID:4900
-
-
C:\Windows\system32\taskkill.exetaskkill.exe /F /IM "explorer.exe"2⤵
- Kills process with taskkill
PID:5784
-
-
C:\Windows\system32\reg.exereg add "HKCR\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /v "System.IsPinnedToNameSpaceTree" /t REG_DWORD /d 0 /f2⤵PID:1672
-
-
C:\Windows\system32\reg.exereg add "HKCR\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /v "System.IsPinnedToNameSpaceTree" /t REG_DWORD /d 0 /f2⤵PID:3712
-
-
C:\Windows\system32\reg.exereg load "hku\Default" "C:\Users\Default\NTUSER.DAT"2⤵PID:452
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\Default\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "OneDriveSetup" /f2⤵PID:1080
-
-
C:\Windows\system32\reg.exereg unload "hku\Default"2⤵PID:5640
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn "OneDrive*" /f2⤵PID:992
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:5840
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:5716
-
-
C:\Windows\system32\takeown.exetakeown /F "C:\Windows\System32\UsoClient.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3180
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\UsoClient.exe" /grant administrators:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4708
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:4644
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM WidgetService.exe2⤵
- Kills process with taskkill
PID:5664
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM Widgets.exe2⤵
- Kills process with taskkill
PID:4604
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\NewsAndInterests" /v "AllowNewsAndInterests" /t REG_DWORD /d 0 /f2⤵PID:2224
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Dsh" /v "AllowNewsAndInterests" /t REG_DWORD /d 0 /f2⤵PID:3652
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:4232
-
-
C:\Windows\system32\takeown.exetakeown /F "C:\Windows\System32\smartscreen.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3668
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\smartscreen.exe" /grant administrators:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2656
-
-
C:\Windows\system32\takeown.exetakeown /F "C:\Windows\SystemApps\Microsoft.Windows.AppRep.ChxApp_cw5n1h2txyewy\CHXSmartScreen.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4744
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\SystemApps\Microsoft.Windows.AppRep.ChxApp_cw5n1h2txyewy\CHXSmartScreen.exe" /grant administrators:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4400
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:1172
-
-
C:\Windows\system32\takeown.exetakeown /F "C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5512
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exe" /grant administrators:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3876
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:1432
-
-
C:\Windows\system32\chcp.comchcp 4372⤵PID:628
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Write-Host '(Not recommended) Can only get search back by system restoring.' -ForegroundColor White -BackgroundColor Red"2⤵
- Command and Scripting Interpreter: PowerShell
PID:2404
-
-
C:\Windows\system32\timeout.exetimeout 22⤵
- Delays execution with timeout.exe
PID:3860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic startup get caption /format:list2⤵PID:1112
-
C:\Windows\System32\Wbem\WMIC.exewmic startup get caption /format:list3⤵PID:3908
-
-
-
C:\Windows\system32\reg.exereg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "MicrosoftEdgeAutoLaunch_5EFC0ECB77A7585FE9DCDD0B2E946A2B"2⤵PID:1704
-
-
C:\Windows\system32\reg.exereg query "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "MicrosoftEdgeAutoLaunch_5EFC0ECB77A7585FE9DCDD0B2E946A2B"2⤵PID:2652
-
-
C:\Windows\system32\reg.exereg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "lco6hk"2⤵PID:4144
-
-
C:\Windows\system32\reg.exereg query "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "lco6hk"2⤵PID:4656
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:4372
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s "C:\Users\Admin\AppData\Local\Roblox\Versions\RobloxPlayerBeta.exe" 2>nul2⤵PID:3696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s "C:\Users\Admin\AppData\Local\Discord\Discord.exe" 2>nul2⤵PID:4736
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX\UserGpuPreferences" /v "C:\Program Files\VideoLAN\VLC\vlc.exe" /t REG_SZ /d "GpuPreference=1" /f2⤵PID:3792
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vlc.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "1" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:4104
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX\UserGpuPreferences" /v "C:\Program Files\Google\Chrome\Application\chrome.exe" /t REG_SZ /d "GpuPreference=1" /f2⤵PID:3988
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "1" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:1868
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX\UserGpuPreferences" /v "C:\Windows\System32\dwm.exe" /t REG_SZ /d "GpuPreference=1" /f2⤵PID:6028
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dwm.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "1" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:2724
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX\UserGpuPreferences" /v "C:\Windows\explorer.exe" /t REG_SZ /d "GpuPreference=1" /f2⤵PID:3092
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "1" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:4060
-
-
C:\Windows\system32\timeout.exetimeout 12⤵PID:1936
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ApplicationFrameHost.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "1" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:4076
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\csrss.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "4" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:1156
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\csrss.exe\PerfOptions" /v "IoPriority" /t REG_DWORD /d "3" /f2⤵PID:652
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dllhost.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "1" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:2000
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dwm.exe\PerfOptions" /v "IoPriority" /t REG_DWORD /d "3" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:1120
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fontdrvhost.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "1" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:5020
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lsass.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "1" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:5024
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lsass.exe\PerfOptions" /v "IoPriority" /t REG_DWORD /d "0" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:5224
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lsass.exe\PerfOptions" /v "PagePriority" /t REG_DWORD /d "1" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:3916
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SearchIndexer.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "1" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:5576
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SearchIndexer.exe\PerfOptions" /v "IoPriority" /t REG_DWORD /d "0" /f2⤵PID:5108
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\services.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "1" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:5104
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sihost.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "1" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:5216
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smss.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "1" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:2832
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\StartMenu.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "1" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:4696
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\svchost.exe" /v "MinimumStackCommitInBytes" /t REG_DWORD /d "32768" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:1216
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\svchost.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "1" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:1888
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\svchost.exe\PerfOptions" /v "IoPriority" /t REG_DWORD /d "0" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:5132
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrustedInstaller.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "1" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:2076
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrustedInstaller.exe\PerfOptions" /v "IoPriority" /t REG_DWORD /d "0" /f2⤵PID:2052
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wininit.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "1" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:2292
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winlogon.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "1" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:1536
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WMIADAP.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "1" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:5304
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "1" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:400
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wuauclt.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "1" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:4536
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wuauclt.exe\PerfOptions" /v "IoPriority" /t REG_DWORD /d "0" /f2⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:3588
-
-
C:\Windows\system32\timeout.exetimeout 12⤵PID:5276
-
-
C:\Windows\system32\chcp.comchcp 4372⤵PID:2392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Write-Host 'Reminder, will take a while' -ForegroundColor White -BackgroundColor Red"2⤵
- Command and Scripting Interpreter: PowerShell
PID:3108
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -ExecutionPolicy Unrestricted -Command "Get-AppxPackage *3DBuilder* | Remove-AppxPackage"2⤵PID:5456
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -ExecutionPolicy Unrestricted -Command "Get-AppxPackage *Cortana* | Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
PID:452
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -ExecutionPolicy Unrestricted -Command "Get-AppxPackage *Getstarted* | Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
PID:3804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -ExecutionPolicy Unrestricted -Command "Get-AppxPackage *WindowsAlarms* | Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
PID:4052
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -ExecutionPolicy Unrestricted -Command "Get-AppxPackage *WindowsCamera* | Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
PID:3764
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -ExecutionPolicy Unrestricted -Command "Get-AppxPackage *bing* | Remove-AppxPackage"2⤵PID:3668
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -ExecutionPolicy Unrestricted -Command "Get-AppxPackage *MicrosoftOfficeHub* | Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
PID:1244
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -ExecutionPolicy Unrestricted -Command "Get-AppxPackage *OneNote* | Remove-AppxPackage"2⤵PID:640
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -ExecutionPolicy Unrestricted -Command "Get-AppxPackage *WindowsPhone* | Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
PID:1616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -ExecutionPolicy Unrestricted -Command "Get-AppxPackage *photos* | Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
PID:4816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -ExecutionPolicy Unrestricted -Command "Get-AppxPackage *SkypeApp* | Remove-AppxPackage"2⤵PID:5860
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -ExecutionPolicy Unrestricted -Command "Get-AppxPackage *solit* | Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
PID:4148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -ExecutionPolicy Unrestricted -Command "Get-AppxPackage *WindowsSoundRecorder* | Remove-AppxPackage"2⤵PID:4104
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -ExecutionPolicy Unrestricted -Command "Get-AppxPackage *windowscommunicationsapps* | Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
PID:832
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -ExecutionPolicy Unrestricted -Command "Get-AppxPackage *zune* | Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
PID:380
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -ExecutionPolicy Unrestricted -Command "Get-AppxPackage *WindowsCalculator* | Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
PID:2628
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3628
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:232
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:756
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2604
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:4176
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:3344
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:3712
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2480
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6104
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:6088
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:5800
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Active Setup
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Power Settings
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Active Setup
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
1Ignore Process Interrupts
1Impair Defenses
3Disable or Modify Tools
2Indicator Removal
1File Deletion
1Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5517b76cba1c1b12ec146a60a2745b28e
SHA10a867eac3a9fe1cba33542fd1184fc08ac8ca609
SHA256c0f0d33d18d79c58d0956a5057ec26407d50bebb8960514ceb88d7fb7fb2502b
SHA512be3215579c6330225640bbae1fa1569f836ba04aad9f4e85b7449de01b076940a9a45abd14b2783a143b51d393f52784894a7fae4a9d527431f804e15635bcb6
-
Filesize
174KB
MD5423129ddb24fb923f35b2dd5787b13dd
SHA1575e57080f33fa87a8d37953e973d20f5ad80cfd
SHA2565094ad359d8cf6dc5324598605c35f68519cc5af9c7ed5427e02a6b28121e4c7
SHA512d3f904c944281e9be9788acea9cd31f563c5a764e927bcda7bae6bedcc6ae550c0809e49fd2cf00d9e143281d08522a4f484acc8d90b37111e2c737e91ae21ce
-
Filesize
1.9MB
MD54803e06db91fdb8b6d1b65c0010d2f87
SHA1f6d68a7dcc9c46e663f586341e8ba8d1be6b0f9c
SHA256beb7becc38ccc7ed37c47fe607b25a966a5f71aabd36ab945c3cba15451dfa7b
SHA512f34195e4dd2b9a0dc4847e94547b3b4f0ee13009878f0e88954e6a070234b902814a7bdc018782cbaddb52e31e19f30bc2273d1b2ed1071f0695563e070c58c6
-
Filesize
2KB
MD5109f47ced5da3f92362c49069fc4624e
SHA179b611073aa0006f1bb4058a6ecb6f3cc97391d6
SHA2562508b43de805b672ee3ceac260731733bf22648325e10be7ffd47223e429a29b
SHA51255a11e520f9e9a4d9aa39e87b6a7675bf5e431d986579ce48fd2aaf0c0b9c5b855fda8c8d048b492f96a38f21dd223b05896bfa6537a4716f33f7fdb3af5a774
-
Filesize
2KB
MD5ed30ca9187bf5593affb3dc9276309a6
SHA1c63757897a6c43a44102b221fe8dc36355e99359
SHA25681fc6cfe81caf86f84e1285cb854082ac5e127335b5946da154a73f7aa9c2122
SHA5121df4f44b207bb30fecee119a2f7f7ab7a0a0aed4d58eeabbec5791d5a6d9443cccffa5479ad4da094e6b88c871720d2e4bcf14ebec45a587ee4ec5e572f37810
-
Filesize
414KB
MD5ab79489e9704fc9cc9d8bee4f8e17ec5
SHA1b2e19a89b43d537bb5b02ee9ca2418f027259c1e
SHA2564d71760d6f3159849068b635ab4c39b9b747d899f03670533971a62d262c264e
SHA51260d11ee023b9a045c4b59b88311f001fcf4856e27837a1ffd6ecab0203e5199ee077d85c5217e0f0b94e0bff93b14c3680816b6fbf9d42ee2eff5c23d9a13edd
-
Filesize
64B
MD5446dd1cf97eaba21cf14d03aebc79f27
SHA136e4cc7367e0c7b40f4a8ace272941ea46373799
SHA256a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf
SHA512a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7
-
Filesize
1KB
MD5b393e1aae554dd45961c38666996e0dd
SHA1ecdbf730b4bdbb19b63824f20726ed621c224fb8
SHA2563bf951123b475242f39407221b43207386af7a5fef5dc70f3eb262ce9ee7cdc4
SHA512283c040139a98d82dedbbebd5bf9875bcb668c17eaf7b1ebe3c76ca17f3d5b06f7d9820ea17878c96560c305a4c006c076da4b76106aa72120f3d41cafd56380
-
Filesize
1KB
MD54215344d7ee23b64d490858bd9bfec0b
SHA1da01fcfb9a83a2c7e84fea20cc4be70a7ad3dc08
SHA25652d1cc34f1c4eebe25d8dad44a5d42d4d9d677fe4b00203552e77eb1bbfd7a69
SHA512b520c90c4709c3dac589f13f25801040458f88c4e96859654052e8e5a723083bfc4b52d297c1a1c42906eb7cf6a46b41b11bc8a6a22939661613275d3a272ee4
-
Filesize
1KB
MD526555f460505eff10343a8b781830edf
SHA1a2ff1cb63557e775cf253dd0cc81716c55143f14
SHA2562e45be2670671338c14bfbdb831b5c84eda9bbea604cd36202afc4f74e12c26a
SHA512a4b7a2973ca7377f5a62f0d4e527f78316c00890c7f0313f75c273b3d72cdf7c31b7e684bddab4c8abfc45fdddd8197434505d57801b1c5fd8121c00d8cf9ea0
-
Filesize
64B
MD55f6573f67ff9bdf38068fd63d0b84567
SHA145a6a2e8c693b274cebb2128f334c5e704d47913
SHA2561131ec6d36744f77fac3dbbe000deba9048c71d6c6819c60e21a9845dd99a930
SHA51266b8039a1a8a930402328fa63b8ef5ca66fbe9e8f3036ae358087e7f46f3ae5cebf289bb429ad9ab8932f8e38c9e6c3c2f2e23542d5a9fc9ec94f56dc879ff6d
-
Filesize
1KB
MD57ee0b8820c7d05b6373323fb9fe86b03
SHA1903a38b30017911439016430da005d50a0be6f1d
SHA2566139a2bc3de6b9e99ada678d6b875e63b02aa64b9667d1281a021bdf7d923f25
SHA51279c94bcad00ccbcf0961a86bff7a06d6bc75fd83f50836747be6ba9ca74efc1290da84d91646dade522755047d3ba7783738fcbc770480310e541989419d0e5b
-
Filesize
1KB
MD56376da913ad5b712c80167b2b8c458f8
SHA1f50b96c9784e0056895a1e66a41da92717cfd795
SHA256602cb9a8b7442279e661078928daf9aff30332915af37ae956a79abe88656461
SHA512720a8580f28d13e68f5441ef21253782a16c5a5c7cd5501c802ec4156561b6c7cb0a02cb683dab5d36c6ca36bee8e34efcf2b649c34a10a02d6085725bf8f689
-
Filesize
1KB
MD5806b9471e5389ac2d835856f54aad2cc
SHA1d5da8befbeb41164f9a96b874232bc03a27b05a7
SHA256a15f73ea621a40742ac68fe775599252af13edfd6b3bac04b401aca4333c832e
SHA512e46ad271df5ef4456b949c701f76215337e1db43379acc6e499a032a780ed218fd564444a7eeec1e0b70d9434b1de02e965ac4dcd5f31fdd8ff8672c9a3d680e
-
Filesize
1KB
MD5ff14504757cbde29afd07695ad26106d
SHA1129c7e3f519d6c42eada4840881aa0f2c59582ea
SHA256a03cd94f0b8e5f849f6cbeac700697c1a79d4fafc96c74c81cc61cd9eaafd991
SHA512d5d995f8adefba28ea6b45b6b411081ee77775b96f3d5f85bd7593e23d97399035d460557c205b2c7bdc790a2b53cffabbb445a51a97c5753ae35db15bb12d1d
-
Filesize
1KB
MD524d33cadec56395ac17355a7c620d1b1
SHA18ac77c7069d1cf7a6a708b05c6d38e12a3a7728f
SHA25616cc68e48fb375356e2c2dc47aae97651c1af45743d878beaa1e7bfd6351c479
SHA512543ebb2bae8ca008f80ef807f97b33bb06f6e09b1d7a60f64957fd0fabe8eb22cf14959e602a25c3ebac538fc6659a1c54439553b09509bfed7dfae3545661fe
-
Filesize
1KB
MD5ebd89bd13a9fb712b979f76d898b8593
SHA1da925f33cf19e78e42801a1fe0019c11fba38cd6
SHA256d38758c902aa5751a1fa327f6ebf48c3654e3a4988cf6c2312a88c6576768852
SHA5121a259314634d9496d2d276f03d6af253cef3e27618f1dc79c2a65061cf0da5bfd3d849173f20c66d648bc34c99d9ecb6e97e9747fb135ebe145959582e6ed8e0
-
Filesize
1KB
MD5a2451ac0fad744ee7d3fcb4fce2660fa
SHA127b92bf7f94d83f88f8a8a9764bc34bb5e0006d3
SHA256ff30632cfb38dcc1dcbe78d56d88eae1767b92d765b8d87e912e282e9b80409c
SHA5121fcef218c41e5475e6e8c74a9f33856d183e5892c20c45133f0e41214df4d5d9f14657e7338e544600f8846b1a15a7e8511157671df083e434a3bbd8ff98ef21
-
Filesize
1KB
MD564f2c690d4f1db4da8949302163c36b7
SHA1dde218386a580cd19de2075ad4a9fd0f8d0eb097
SHA256c5105b7eeb36ae4b7138a112c5e33cee6ab150a99f8753fcc63d1e727919625a
SHA5126cdb4c19e6f5a1eefb20a3558d14fc9f9de4f06e062909192548bf0ec2e72a428f6e776e593c85722f0a618a1b1be5465df484017fa757db20789eac1fde490a
-
Filesize
1KB
MD535eb70a060e986c68bb7369a87fc830c
SHA1760f9e9d808d4789fd3ba322dc82b5feb78edf78
SHA25658d5b25cb9c4825502729ef45ee88c2423ff22c7443e3ae0d8ad71a60f56d966
SHA5121ea117d68814a2c2bfc76ad9f6c5b8814b11e6a4cacce657ba2f821cb1295c9b6033fa99eed5c786c34df5bf3f7c8358ce385595683dba2e58c95aa359d6e2a0
-
Filesize
1KB
MD5b7d5ef7edfd9175371e51ac6f9dcb955
SHA1e9b44184860495453dedbd3ebec1f44f09b932a9
SHA2562b44bba8102d3d16e2a4af7f052f6f7474d6fe8a38ac996e5865afb902bff64a
SHA5122e0dc5bc1b1cc8ec171059d569d8e79919b681e9a6edfa9de09d03a9daf8b8f7aada7a2e23d5fae58e14f52c861d244cfd0efb016cada01e99e2937fd8aa233f
-
Filesize
1KB
MD52ed1587626b8aa67b8e7ca5eab13e83a
SHA1414eabcdee9ef68b12844eb119000c64598632f9
SHA256328c033acac8dfcd97028fcc0a35d0fd8cbf5987052db0322443298414aa5f3c
SHA512913afc61485799d58cc6acfe628863c5601ae647ba94e19dff5b8130c8e416eb941d760169e81407226e3aabf320fbe2a4fced5b92b3be0316246625a7546e22
-
Filesize
1KB
MD5a4b94c7665bb831f6facf5ea2425f855
SHA12f94bfcc0868e8e0df37b37733812f4d8cbf0caf
SHA2561f079ab34a44f73b1ede084ec34fcbf8ea5b7b5558812d0e77e7b9534b53f928
SHA51239a23870a345d88f2dcb3c50cd571d726a40e3062fbf1affd6d2a5e2edd5a1700b1a036b3aef3184f143d34670d58907e4f92c5a678c91802e1b000266d8801e
-
Filesize
1KB
MD552810a935dbb2681803c2f3d921b1c5b
SHA196a7bc59f5fc127f5dcab7b2b75d7143be103b15
SHA256b980f162bfd47f65aa2d9aa4547bb63167d9c607f38c15e934cba7a952d95015
SHA5123f24a7512eb6674ba04f27cedb49141f63b6c2eb82c4e06d0d86658abb556d02e77e1b4eadc1eb30de642c248359d7656e9275ce48499ca73634497f49183e76
-
Filesize
1KB
MD5f6313c9b54959d8bab2dc1e97b7f58d2
SHA12896b998c7d036393c36d905206dc84147e9fd78
SHA25678a5997c5797e6bc9a53cacc899c493aca5b5e13e6ca64e2d0b735729cdf7c83
SHA5122fca110e700d9e8e3a146cc2c47a13dd50b806496ce9b7d8c97ebdfe1da1d664992f7ba019ae1b75a1bc13f243a18ea6308200e22e611cfad3ef6f13004324c4
-
Filesize
1KB
MD5265dfaea3cebf134b2080f813c17b2c9
SHA17a56042c3a151815bc923dac2146b48e08eb6b45
SHA25618eef7681b252b93e666e6857af0f2868781127d6fc783806b9ff806e1398cb4
SHA512d6c91856ae43248e75ddc468d45f0059c0172dfe8dad61a59b96f2a4ec658a3555edb0797dbe9da58408e7b382e0290b9f3ef1b99db0d298a56d02f830534738
-
Filesize
1KB
MD5e57094ec391ca1cd5706d6631a9fdbdb
SHA1d3ed78ec0380031184a26860d7a9afbf5b5896bd
SHA2568d45965daa84d77bae1e833bded8c8717ee19b1950c2d95fe8b3eabbe8b84830
SHA5128ecd830c99acdb3e42204f80f6564e53c4b62f8439850fdf8f1e54f9b58c0601651f5112349799f56be14b7fe24023511909834aee7511d4e5eb29da248e8cb3
-
Filesize
1KB
MD5af2ec86340ebbdfd3d752f67a3158e2a
SHA1b4cc27f1b9a8a82d099a02cc81811763a1c7467c
SHA2562c191414408073946ede60a93ec4b24b2c7134c18ff30ef5e6df61119c5d3c6c
SHA512c9e99af2764e411a1f151ab8abe49762c8a3d3a000c869bd7934b2fe53b23163cb6557b58ac0fbf63e32f64c534d9d6c6a2de5dfa8fb95639607bd4c9bba7a38
-
Filesize
1KB
MD53fcfeeb2ac097bfab76d2d55ca433d6c
SHA1fb2ddd3f61f84a6ec170141761459e66db856111
SHA256d12d2443bfc2f725ea269cbb2c7ef0c7d8c08637314ac3e57cbad58478a37427
SHA512a6c6cbca1f2c708e9aa6312a36b007b8873669c9c40dd217e295f9cffde3bc89c7553729d3df8496bf7dc52c36912559de7fc1f5a149a2bc213e0db07629047f
-
Filesize
1KB
MD554dce1126b9a841046dd35e5aa280db1
SHA1582de3da4a48e688d4da7d2a03fd95a715a2fe35
SHA256259bb3209e5259541f2a87db51e1443bc2276090799b2c42bac3c06851730e65
SHA512231a35eed3331777dafb4cde356d783f70a0af1971ebd12824c5ac9a3bcd585ae4cdce8faea15793ad9855035466b30f45077bf784be550cf6ffc9baeda5e36d
-
Filesize
1KB
MD59cb67497f34f881edf6f3d9f43778ecc
SHA10d823bd690cb87af94521fe8e5060578f5266fad
SHA25609a3198a068155474600e79c04cde4ff3be5e1ac9a23d7efb2fc3d794154d795
SHA512be1e256537e279d0eedf0b84b2ed8dc54764c6ce6d0346b3efd5132555d31604f991ffe69a6f6e22cfc9f7b7c036309e5954f2c28f0aadf517b46c716d043b89
-
Filesize
1KB
MD5a1131cd513767d0fcb4b35666d8d9ae9
SHA1c1ba430218d3cd81a5baf043b1caf9ef282e4e0e
SHA256d830812571bab857bb62d69140f64c14accc0251a1230184fbb455018c0a1ee6
SHA51229f1b6da3500c991eeff46b827dfc5a7ba85849ef5c0562ebe40f3f99ec6b4e5eb74e12a6b16b883601f7372ca9756923fa0dd3c0362ae3321a7a2d092008484
-
Filesize
1KB
MD5be0fdf0ab1467648f332520a0109aee8
SHA13e787f28b145e32952d516a8071d89733c2aade5
SHA256bf3ab605df441e4a0dd43b0c16557e66b78aa0bcefd295373064d9cd75a79c55
SHA5129fcd773dfc9f957422d5b85d2bc70770cc02f132a8cf0c4080bcf5e2954aa6a5998294fc3e3cafab0f4b4878b5833c75918140eda5fcdbf31f20e4aa5d6e2395
-
Filesize
1KB
MD55f7c09c72ba5740197b14d6b3e536a5d
SHA110e0cb277ab2d946e58fdecc831adb5dcbc144dc
SHA256ea593d0711e98aade96282090be0c35adf5eb8ce7df3a024437b267754e5cce2
SHA5121160f3c8aaf774b4902888c30f55079a4aac0b64e59243456ccd53459019bc5047cdac3750bbf90651da42efa4e061e74e8ab6b168f3af9304cd0169905172d0
-
Filesize
1KB
MD5a68b9e4f7df2d35b5c289becf3940c05
SHA1afbbbb4d641c10664235237ec0a31dbb1d35c31a
SHA256d6a54a441714f30936f8a07a28aa4d367114f36b81b83de099e2f7b1e2943c71
SHA5123f91b2653c61dc07a220ae3acd2f96824a637de7edb4076fd25276dbd51aef3ddf1d0632dffd62b956ca7ae14851e4bd2086d45842f25a9e31f6e9b880ec8190
-
Filesize
1KB
MD57ee5a0a194a245150ecdfc6b95e8f80c
SHA192a9a84f79144352e4e4eda3981ce3ba05e6b10d
SHA256f9a29e7cdf9b62727a17bffb3f0b74e16d245904438cd89884d1949da0ad7776
SHA51287ff18e63e1438bee8a180009fbb273d7520df49ab7c171b75890ba7ae7167cab163eafb313c046eed2ec99c7b492cb0cfc3c898ee4755ca51b8684daae68971
-
Filesize
1KB
MD56bfbb479ac98bb846a78d2e6a363863b
SHA10f643c37abb002b925777cd91862ac54bdda7105
SHA256c61781a558905efd182564c510518fdec307a7e6f800f1b77cbbc1f42dba6cf5
SHA51299d82fd99ed06cdb74e8f6cc4ac19072b14a52d0ca70418b66a27ba5a16fd56a31aae4969446ac56f166b78712e2e953829448806112cbcedce9263fbd045836
-
Filesize
1KB
MD5de7372c648ce1f968aedfc7d029d7463
SHA1ed8e8be83201c6982d8559f24f9ef331e8dda05c
SHA2567d5fee243647138329ef0a0c484cf7bdc4f50d22078bc79c0c9d9028855a4678
SHA5123866e4b38981d12def0ace76e1b05dfb828180ec1a93e49c32431fa5940ed6ef2c9f711ad83f254988b73a78bf445a7c8272343c6e65f7a1967c79b9076a2e34
-
Filesize
1KB
MD534c2d5a7985b7111b33c354489791420
SHA172b1a17123779df6f6cf701ee3497a4a19ad1907
SHA25664b0a1116dadc93bbb67856465de393adfdf8651b9e5588d8731bba473996177
SHA512f3754dcc90465bd35ff93b0a26e00899bb10c582f4d3c817f9de540c9ebb1342d4336598affa8c412e4cecd414994fbd659079c8eb4d80d19d039793e948b614
-
Filesize
1KB
MD5e3199796aede20c6dc2599308aa1d87b
SHA15c28b9707f0984af51e53c26dd1be82012799fbd
SHA25640ece7e2dab14c941474b7a343f1cf068ccfab359afceba923cd6261c4e3469d
SHA512f45560689334e341bdc31505895596691d707387f5814e35667c37aee419cd223c5cf1341f110133bb57bfb5e1e15ac903e0bffa0279ab0095ee6b4f4b8846cd
-
Filesize
1KB
MD51d540a3e817110f4568dbec2419265a2
SHA1d508d11c46072e34ce6c4310bcf2bfa55b46459f
SHA256f05e746775a89ee0c0c91eaca3a9c5ada1ce612a7363db91b0e030c8b9dc8ed4
SHA51252150a3ba2810562cf0baf09868f456f4a9ebea2364af1ff778ee0d0a392cde1df294f5e90a28c67d1a94506d0622c701120fce5d1c9646e64a466acb09eaa29
-
Filesize
1KB
MD58ca3b5fcad0fc701039f928ab6e02423
SHA1be6eb769d64b4b361be4a02071fd215cb764f86d
SHA256727b3b0cd9dc26d25c652d5458f0b1eabbc34499716f8a5586b32580618096ff
SHA512aacb5dd4e58050f8f8b6ee18984fac2e776e55beb8f97549ae84e98cc45123a1369096eee5a10a666ccd9a89635fe3850854928c13e4fa88449ca873979f33a7
-
Filesize
1KB
MD5e8cbca79376cb4cd574beae8910d1022
SHA1055a1489944aee83befb6e759d1e0ee91a5a8328
SHA256c94efa6e725e511fe3be0c7fad11b673bb78c5e25a25e6a77115a2915b39e637
SHA512f6301dd291514dbf396237d951ce768e94b00c953058d9fcd901d3ec7381db7be98ab2a77826ec229cff14e563daa0529768e1d49228048e7239cf88b8e66d8f
-
Filesize
1KB
MD50b7496e4c3877e49f08770d947b08e62
SHA11141e013d763705f3dd9a6ad1a4e48a130b4bc0f
SHA2561658dfccb8cf20e6e4cf10d28cc79ef6d20b954d0aafeaa1dd0d06f2a5e2ef4f
SHA512bae4a97654de3b537f469969570f41a7f2586cd7a2b360390d03874bb5bf6b32f168d10e7e00479af1213bb1c131bb6b2728334820a114a8eec49d63a60047dd
-
Filesize
1KB
MD507c1bce2ffeb22aebfefee8b56d1e56c
SHA1c33717181f9c413c382a4720b406378ad7b925c2
SHA2569086b525d37aa1047bd7ce9bf2d864cacda967f9fdc4094618727790639875c1
SHA512bc9f2a737d06429c3771bc51489b00f5b1027f4a2d61eadd999546751c9f4bd40c3354eba95de2c79c91c3f7071daa891a5978d52fa493ed45e5e3267ef7cb0e
-
Filesize
1KB
MD51e5d2032f886417080675d80b62232cd
SHA15d05ac5e58314c89edc89fd172b02e03a5145840
SHA256940e3e8ff1859876915e9d8aa409964b043c13cc1d885e444eef9bda15338237
SHA51229a526095d674baf7d3da81a60ebc81bcef0b65ee35812ad815ec0752320cb0c2cbdc6d511c8eff08d9465fd6ccd233e2424251a3bafc63879c77803de217b83
-
Filesize
1KB
MD5db5616408f44c9e876be42a0be36897e
SHA154e7366cdf6d1c3e50d170c144b97ca9661cab6c
SHA25678f18d6b128931f3ff6a7385b94e57d72e8c5537b0c83f4bd6ee8ea44177b44d
SHA512bd0d16c946207b0a2a49fee98a0f28c4565b8fef80aabe976c30918fd3ad39016c70929e25f14f156b72ea57365a30acb927277105f357b098677cc7d91d84fb
-
Filesize
1KB
MD59b6b85138ed1f7688b2c02d36ad0c003
SHA14513bee1da0b1613ef5c800fbcff157a8ad90753
SHA256cd464d32fd1dd30bb0c52b598200e97ae893bbfd5d04951a4fe0540bc6ef6cbe
SHA512f2501f4d2565e1aa40198950a1f5e4d0ce9c10c9df36b7c2f5c825a84ab3a1551c3351310e4478fd329ebd0c2acfc2ad03871f3393e9a443a20c1ae55b6b022c
-
Filesize
1KB
MD5b97a7f07ebb9bf40de30eca6998855c0
SHA1d7544538b9157f0f8e171d1c0e4c09c5578b0594
SHA25652410f01a35324219078cc326a004f7ca7aee89dbc0e91e841f24cc5aaabe1f0
SHA512564e299d417918f809544975d2d8c00d6d674f297673c695bf9d7606453cd224643e31e411f9662c47f4274a2ee6b868fd43ceaede2bb7e1eb5aa33bb65e5f30
-
Filesize
1KB
MD5d3d993c574ed40fcc8961aa9b489f8ef
SHA10638f3002bd5c96dd71dd201ce442970d44a6e4d
SHA2561b08bb918cb9edc7c027c8dccac83826999fccf3c7217058d0588aacc597bbac
SHA512ac89fffbf31a2831ab97e49dd6479c17f6382a05737a3a6a22f47ee044cab786c787bcf367a2b1973d56e73ce3b8857fbe82a483823ccbffb40909023cf14a0a
-
Filesize
1KB
MD51d32f982c6d03141bda419e658ab1fe3
SHA13742cab7fcdcbf177f0fa055e52fccaf970198c0
SHA256f63e3a84860b6a384608a37148d2bb693247c30c5ef7f5d73ea6234ddad6bc64
SHA51269d5d9d7db10371e45678933d9a1dcd300ac6ccf9173213d517490f71d48eea059515f3608ca6a04d355af5fc91573e448d3418e848ebc8b300ab78e81cd9938
-
Filesize
64B
MD57eb64c5485544cdda7652b2700a68f4b
SHA1166f9820d11db6a3bf23a747dd98714af79f558a
SHA256db0bbffbd22a326edc5d1e40cc924e5e86067f390273e2d91151561237284c9d
SHA512f7c88e2c6df3aaaa0f77e68c6ff781a43a05aa4de50c1475302fd9b264c343398662996840c1a062812cc3f35a81d7c36f2a2a64859ea1c5dedcc71b1d787c28
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres
Filesize2KB
MD568042dedb88636cc7cbe0e302d2e703c
SHA1af42e7261bd93bbf6c18a7b0470957bd7a787fb2
SHA2567dee7f45b89aad54625716672751c9839c73dd2ee6344bd3ff2050567c508469
SHA5127cacc44b173c1d1e4d3eb4fddc6ec0f86202bc946f2e72cbc56e68522eb6e19302ad41581bfa79807a7203f19c25f6aca87f376637085a1b67eb09c5f73e4edc
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\T68J5XC3\microsoft.windows[1].xml
Filesize97B
MD54de1d8362fe9bbeb267e5b3f08dffdfb
SHA111334d3d31a77fa238dfa8bffb5e73ad84ab0d1f
SHA2566f988fa517fd4a8441b88b9f70e87fd42701b1439e492c4ee495815d03f36120
SHA512f0299558ddf4dffedb0fc474502877361905cbdaf2f0bbc3992757088cf383881bd82d54947dd829091ff550790e6115bb71b03e1dbd2480ecf87cd0cd7aeddd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82