Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-06-2024 21:11
Static task
static1
Behavioral task
behavioral1
Sample
445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exe
Resource
win10v2004-20240426-en
General
-
Target
445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exe
-
Size
1.8MB
-
MD5
7f0867789e10a5edf7eee995468f2061
-
SHA1
e83705193d8367e4281905a9d7b809bee0942543
-
SHA256
445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490
-
SHA512
04b3a4bb6ca3da715ae6a6941fb27fc9bd5785130ebd9d70ad73f45354ebd7f6da1e075c2491a4351584fe3459d120c34d6875b1ab9610a138bdb14d722430a2
-
SSDEEP
49152:stz5bImEGdR679cjgtZoLj1n0C7/rW+u:stz+mEGdvgEl0K
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
amadey
8254624243
e76b71
http://77.91.77.81
-
install_dir
8254624243
-
install_file
axplong.exe
-
strings_key
90049e51fabf09df0d6748e0b271922e
-
url_paths
/Kiru9gu/index.php
Extracted
risepro
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
axplong.exeexplortu.exed991ab00ad.exe0f1a3878cf.exeaxplong.exeexplortu.exe445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exeexplortu.exeaxplong.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d991ab00ad.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0f1a3878cf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 1308 powershell.exe 5252 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
services64.exeWindowsAutHostdescription ioc process File created C:\Windows\system32\drivers\etc\hosts services64.exe File created C:\Windows\system32\drivers\etc\hosts WindowsAutHost -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exed991ab00ad.exeexplortu.exeaxplong.exeaxplong.exeexplortu.exeaxplong.exe0f1a3878cf.exeexplortu.exewmiprvse.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d991ab00ad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d991ab00ad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0f1a3878cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0f1a3878cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wmiprvse.exe -
Executes dropped EXE 16 IoCs
Processes:
explortu.exed991ab00ad.exeaxplong.exe0f1a3878cf.exe6da7ca91e1.exelrthijawd.exeaxplong.exework.exeexplortu.exejergs.exessfqe.exeservices64.exeWindowsAutHostaxplong.exeexplortu.exessfqe.exepid process 2276 explortu.exe 2104 d991ab00ad.exe 3268 axplong.exe 4132 0f1a3878cf.exe 3744 6da7ca91e1.exe 1084 lrthijawd.exe 5024 axplong.exe 560 work.exe 3504 explortu.exe 2604 jergs.exe 4952 ssfqe.exe 1340 services64.exe 1120 WindowsAutHost 6100 axplong.exe 1716 explortu.exe 5732 ssfqe.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
axplong.exed991ab00ad.exeexplortu.exeaxplong.exe0f1a3878cf.exeaxplong.exeexplortu.exe445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exeexplortu.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine d991ab00ad.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine 0f1a3878cf.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine 445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine explortu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explortu.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows\CurrentVersion\Run\0f1a3878cf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000012001\\0f1a3878cf.exe" explortu.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000013001\6da7ca91e1.exe autoit_exe -
Drops file in System32 directory 5 IoCs
Processes:
services64.exepowershell.exeWindowsAutHostOfficeClickToRun.exedescription ioc process File opened for modification C:\Windows\system32\MRT.exe services64.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe WindowsAutHost File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officeclicktorun.exe_Rules.xml OfficeClickToRun.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
Processes:
445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exeexplortu.exed991ab00ad.exeaxplong.exe0f1a3878cf.exeaxplong.exeexplortu.exeservices64.exeWindowsAutHostaxplong.exeexplortu.exepid process 1068 445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exe 2276 explortu.exe 2104 d991ab00ad.exe 3268 axplong.exe 4132 0f1a3878cf.exe 5024 axplong.exe 3504 explortu.exe 1340 services64.exe 1340 services64.exe 1120 WindowsAutHost 1120 WindowsAutHost 6100 axplong.exe 1716 explortu.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
services64.exeWindowsAutHostdescription pid process target process PID 1340 set thread context of 4188 1340 services64.exe dialer.exe PID 1120 set thread context of 5872 1120 WindowsAutHost dialer.exe PID 1120 set thread context of 5908 1120 WindowsAutHost dialer.exe PID 1120 set thread context of 6000 1120 WindowsAutHost dialer.exe -
Drops file in Windows directory 5 IoCs
Processes:
445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exed991ab00ad.exechrome.exejergs.exedescription ioc process File created C:\Windows\Tasks\explortu.job 445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exe File created C:\Windows\Tasks\axplong.job d991ab00ad.exe File opened for modification C:\Windows\SystemTemp chrome.exe File created C:\Windows\Tasks\ssfqe.job jergs.exe File opened for modification C:\Windows\Tasks\ssfqe.job jergs.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 1084 sc.exe 5584 sc.exe 5708 sc.exe 4460 sc.exe 2456 sc.exe 3104 sc.exe 4684 sc.exe 3400 sc.exe 3232 sc.exe 1780 sc.exe 4508 sc.exe 5656 sc.exe 5752 sc.exe 5792 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
wmiprvse.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
chrome.exewmiprvse.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe -
Modifies data under HKEY_USERS 62 IoCs
Processes:
powershell.exeOfficeClickToRun.exechrome.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe_queried = "1717535597" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\RulesEndpoint = "https://nexusrules.officeapps.live.com/nexus/rules?Application=officeclicktorun.exe&Version=16.0.12527.20470&ClientId={453AF952-5678-4983-A91B-F7D586F23203}&OSEnvironment=10&MsoAppId=37&AudienceName=Production&AudienceGroup=Production&AppVersion=16.0.12527.20470&" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,41484365,39965824,7153487,17110988,508368333,17962391,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe = "Tue, 04 Jun 2024 21:13:17 GMT" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133620091264505938" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1474490143-3221292397-4168103503-1000\{B7F19069-4DB6-4EA0-9B42-34D1FDBCB881} chrome.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exeexplortu.exed991ab00ad.exeaxplong.exe0f1a3878cf.exeaxplong.exechrome.exeexplortu.exejergs.exeservices64.exepowershell.exedialer.exepid process 1068 445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exe 1068 445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exe 2276 explortu.exe 2276 explortu.exe 2104 d991ab00ad.exe 2104 d991ab00ad.exe 3268 axplong.exe 3268 axplong.exe 4132 0f1a3878cf.exe 4132 0f1a3878cf.exe 5024 axplong.exe 5024 axplong.exe 2708 chrome.exe 2708 chrome.exe 3504 explortu.exe 3504 explortu.exe 2604 jergs.exe 2604 jergs.exe 1340 services64.exe 1340 services64.exe 1340 services64.exe 1308 powershell.exe 1308 powershell.exe 1308 powershell.exe 1340 services64.exe 1340 services64.exe 1340 services64.exe 1340 services64.exe 1340 services64.exe 1340 services64.exe 1340 services64.exe 1340 services64.exe 1340 services64.exe 1340 services64.exe 1340 services64.exe 1340 services64.exe 4188 dialer.exe 4188 dialer.exe 4188 dialer.exe 1340 services64.exe 1340 services64.exe 1340 services64.exe 4188 dialer.exe 4188 dialer.exe 4188 dialer.exe 4188 dialer.exe 4188 dialer.exe 4188 dialer.exe 4188 dialer.exe 4188 dialer.exe 4188 dialer.exe 4188 dialer.exe 4188 dialer.exe 4188 dialer.exe 4188 dialer.exe 4188 dialer.exe 4188 dialer.exe 4188 dialer.exe 4188 dialer.exe 4188 dialer.exe 4188 dialer.exe 4188 dialer.exe 4188 dialer.exe 4188 dialer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exepowershell.exeservices64.exedialer.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowershell.exeWindowsAutHostdialer.exepowercfg.exepowercfg.exepowercfg.exedescription pid process Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeDebugPrivilege 1308 powershell.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeDebugPrivilege 1340 services64.exe Token: SeDebugPrivilege 4188 dialer.exe Token: SeShutdownPrivilege 3876 powercfg.exe Token: SeCreatePagefilePrivilege 3876 powercfg.exe Token: SeShutdownPrivilege 2280 powercfg.exe Token: SeCreatePagefilePrivilege 2280 powercfg.exe Token: SeShutdownPrivilege 1988 powercfg.exe Token: SeCreatePagefilePrivilege 1988 powercfg.exe Token: SeShutdownPrivilege 2796 powercfg.exe Token: SeCreatePagefilePrivilege 2796 powercfg.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeDebugPrivilege 5252 powershell.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeShutdownPrivilege 2708 chrome.exe Token: SeCreatePagefilePrivilege 2708 chrome.exe Token: SeDebugPrivilege 1120 WindowsAutHost Token: SeDebugPrivilege 5872 dialer.exe Token: SeShutdownPrivilege 5832 powercfg.exe Token: SeCreatePagefilePrivilege 5832 powercfg.exe Token: SeShutdownPrivilege 5856 powercfg.exe Token: SeCreatePagefilePrivilege 5856 powercfg.exe Token: SeShutdownPrivilege 5848 powercfg.exe Token: SeCreatePagefilePrivilege 5848 powercfg.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
Processes:
6da7ca91e1.exechrome.exepid process 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 3744 6da7ca91e1.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 2708 chrome.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe -
Suspicious use of SendNotifyMessage 38 IoCs
Processes:
6da7ca91e1.exechrome.exepid process 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 3744 6da7ca91e1.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe 3744 6da7ca91e1.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3312 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exeexplortu.exed991ab00ad.exe6da7ca91e1.exechrome.exeaxplong.exelrthijawd.exedescription pid process target process PID 1068 wrote to memory of 2276 1068 445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exe explortu.exe PID 1068 wrote to memory of 2276 1068 445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exe explortu.exe PID 1068 wrote to memory of 2276 1068 445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exe explortu.exe PID 2276 wrote to memory of 1920 2276 explortu.exe explortu.exe PID 2276 wrote to memory of 1920 2276 explortu.exe explortu.exe PID 2276 wrote to memory of 1920 2276 explortu.exe explortu.exe PID 2276 wrote to memory of 2104 2276 explortu.exe d991ab00ad.exe PID 2276 wrote to memory of 2104 2276 explortu.exe d991ab00ad.exe PID 2276 wrote to memory of 2104 2276 explortu.exe d991ab00ad.exe PID 2104 wrote to memory of 3268 2104 d991ab00ad.exe axplong.exe PID 2104 wrote to memory of 3268 2104 d991ab00ad.exe axplong.exe PID 2104 wrote to memory of 3268 2104 d991ab00ad.exe axplong.exe PID 2276 wrote to memory of 4132 2276 explortu.exe 0f1a3878cf.exe PID 2276 wrote to memory of 4132 2276 explortu.exe 0f1a3878cf.exe PID 2276 wrote to memory of 4132 2276 explortu.exe 0f1a3878cf.exe PID 2276 wrote to memory of 3744 2276 explortu.exe 6da7ca91e1.exe PID 2276 wrote to memory of 3744 2276 explortu.exe 6da7ca91e1.exe PID 2276 wrote to memory of 3744 2276 explortu.exe 6da7ca91e1.exe PID 3744 wrote to memory of 2708 3744 6da7ca91e1.exe chrome.exe PID 3744 wrote to memory of 2708 3744 6da7ca91e1.exe chrome.exe PID 2708 wrote to memory of 696 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 696 2708 chrome.exe chrome.exe PID 3268 wrote to memory of 1084 3268 axplong.exe lrthijawd.exe PID 3268 wrote to memory of 1084 3268 axplong.exe lrthijawd.exe PID 1084 wrote to memory of 2796 1084 lrthijawd.exe cmd.exe PID 1084 wrote to memory of 2796 1084 lrthijawd.exe cmd.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 968 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 2608 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 2608 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 1712 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 1712 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 1712 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 1712 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 1712 2708 chrome.exe chrome.exe PID 2708 wrote to memory of 1712 2708 chrome.exe chrome.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:632
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:460
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:996
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:720
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:1036
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1100
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1160
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\ProgramData\orvbb\ssfqe.exeC:\ProgramData\orvbb\ssfqe.exe start22⤵
- Executes dropped EXE
PID:4952
-
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6100
-
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1716
-
-
C:\ProgramData\orvbb\ssfqe.exeC:\ProgramData\orvbb\ssfqe.exe start22⤵
- Executes dropped EXE
PID:5732
-
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe2⤵PID:4216
-
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe2⤵PID:1608
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netprofm -p -s netprofm1⤵PID:1212
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1392
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1400
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1580
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:712
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1616
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:1732
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1792
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1868
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1968
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1832
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1932
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2132
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2224
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:2320
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2356
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2428
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2436
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2492
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2760
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2024
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2752
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exe"C:\Users\Admin\AppData\Local\Temp\445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"4⤵PID:1920
-
-
C:\Users\Admin\1000011002\d991ab00ad.exe"C:\Users\Admin\1000011002\d991ab00ad.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\1000012001\lrthijawd.exe"C:\Users\Admin\AppData\Local\Temp\1000012001\lrthijawd.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "7⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exework.exe -priverdD8⤵
- Executes dropped EXE
PID:560 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\jergs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\jergs.exe"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2604
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000014001\services64.exe"C:\Users\Admin\AppData\Local\Temp\1000014001\services64.exe"6⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1340 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart7⤵PID:5028
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart8⤵PID:1784
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc7⤵
- Launches sc.exe
PID:3400
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc7⤵
- Launches sc.exe
PID:1780
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv7⤵
- Launches sc.exe
PID:3232
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits7⤵
- Launches sc.exe
PID:4460
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc7⤵
- Launches sc.exe
PID:2456
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 07⤵
- Suspicious use of AdjustPrivilegeToken
PID:3876
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 07⤵
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 07⤵
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 07⤵
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "WindowsAutHost"7⤵
- Launches sc.exe
PID:3104
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "WindowsAutHost" binpath= "C:\ProgramData\WindowsServices\WindowsAutHost" start= "auto"7⤵
- Launches sc.exe
PID:4684
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog7⤵
- Launches sc.exe
PID:1084
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "WindowsAutHost"7⤵
- Launches sc.exe
PID:4508 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:5092
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000012001\0f1a3878cf.exe"C:\Users\Admin\AppData\Local\Temp\1000012001\0f1a3878cf.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4132
-
-
C:\Users\Admin\AppData\Local\Temp\1000013001\6da7ca91e1.exe"C:\Users\Admin\AppData\Local\Temp\1000013001\6da7ca91e1.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account5⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff14b4cc40,0x7fff14b4cc4c,0x7fff14b4cc586⤵PID:696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,18179742256182648134,406661226846115275,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1908 /prefetch:26⤵PID:968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2092,i,18179742256182648134,406661226846115275,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2088 /prefetch:36⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2156,i,18179742256182648134,406661226846115275,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2172 /prefetch:86⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2940,i,18179742256182648134,406661226846115275,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3148 /prefetch:16⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3076,i,18179742256182648134,406661226846115275,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3172 /prefetch:16⤵PID:3456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3528,i,18179742256182648134,406661226846115275,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4396 /prefetch:16⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4552,i,18179742256182648134,406661226846115275,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3268 /prefetch:16⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4316,i,18179742256182648134,406661226846115275,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4524 /prefetch:86⤵PID:1252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4288,i,18179742256182648134,406661226846115275,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4692 /prefetch:86⤵
- Modifies registry class
PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4832,i,18179742256182648134,406661226846115275,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5008 /prefetch:86⤵PID:704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5004,i,18179742256182648134,406661226846115275,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5052 /prefetch:86⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5328,i,18179742256182648134,406661226846115275,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4820 /prefetch:86⤵PID:5752
-
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:3492
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3852
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3920
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4000
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc1⤵PID:4060
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}1⤵PID:4256
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc1⤵PID:4400
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:2100
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:2684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:4916
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:1368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:3684
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2472
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:1444
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4180
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3276
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵PID:1908
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks BIOS information in registry
- Checks processor information in registry
- Enumerates system info in registry
PID:3348
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:5036
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:872
-
C:\ProgramData\WindowsServices\WindowsAutHostC:\ProgramData\WindowsServices\WindowsAutHost1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1120 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5252 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5272
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:5576
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:5664
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:5584
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:5656
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:5708 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5716
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:5752
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:5792
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:5832 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5944
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵PID:5840
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5952
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:5848 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5896
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:5856 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5968
-
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5872
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:5908
-
-
C:\Windows\system32\dialer.exedialer.exe2⤵PID:6000
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5713a645c9524d137db3c5547b12708f7
SHA1dc3a407cf08c26511f22f256182d3a240630925c
SHA25696190d67193af8ce4c121115007a1b757e6b581f31cbf7ba81f4f4828a81ffa8
SHA51283615c402b5bc7d7ca3e23979742b0aeb3d7c3ad4db197c910a3650668b2ee62a66c4bb7caa254b3319b37f182c1fb5560e3d755a7ad6e67c39d0f681d49f910
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD50a6a85f80fee0d1d665694f54abc5225
SHA115c8d4464117bdfd2c79f642104fc1208aee2c2b
SHA25605742d593dba1813596917b82c2ffe5b8ae5534430ee61cb037590053f78d5c4
SHA51284751dcb3492f74d4a9cf41efdf9656611d1de5e0e8ca676832e0125228136fe2e09813c9841cb926a1c5c0b9ee822e4d08eeefb7dfaf5158801c0af6ab49564
-
Filesize
384B
MD550f23a3489b902a2c2fcfe2293527593
SHA1b2206e335501c0a0377f42c84db0da93dd5e892b
SHA256b29fd8cbb82ed6b1a6a1b07c123e105c695225fb1a50162f1e84011d802e1057
SHA512fbb47f2f8cdd8f0e75541adea0f0c21f8924025d403ba0bc7911139cae0a3282d574a252946b6cb07ca812964b4cd9c5002508141027d6298849ae1e681e9ef2
-
Filesize
3KB
MD56d6c4e6ebf675cfe64873c0098b99295
SHA16957c83898aca3bfbdfec41c1f2fb44ae41de90a
SHA256a026f0b256ad884c2c6f40ef1dff26dbe0d41b692b9b1d2bbbb1276d893f17d6
SHA5122165413886fe08b3240381eea2f81b55b799c2ee4835ad163ada38840950dcb3bae0b35f31652b7b31f01b3deeb5a34ef38188918376e0658cc6ab363c188aed
-
Filesize
3KB
MD539c8bb91bcac94d9d822be5b341cf4cf
SHA1668df3c70b40a4cfeb2a8664dbd47c123e1a2ae6
SHA2567df9f840cdf7c71b6867f95622c52e5af08d618dfbca68f562b6cd4a530f67cf
SHA5127ee5a41b514e99f11a2407afdefd35152c1e8362867e81d6b331bfaef3461a83b4f5eeed1cd41c2e135c79df4b8e5f4cae8eade80cd6bc7896ac337e658f08ca
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5e2c4862abbd88f95a55e360f62c41e2f
SHA1d3f55438e3f4dae0aa472345826dad18fdfb729c
SHA256292809ffc72394f706d45880d24e2c2b7e7b1b5e86c145b38eef11e0631aded2
SHA512a96de6c631ba3aaed858cd9e166ec44ec52b0974b1d2c2578090a8b243e764fa6a1ed536503659649a50a1404fc9417bcfc3702e53471cbd8fca0420a53fa191
-
Filesize
524B
MD5982ba6cc5821dc043da34d394920dfca
SHA139c8a122833030c60ee0ecf27a10faf5d57c92bd
SHA256cef0c5c0b5e641ffbc281088f5366be75ceeac66edfb6829b74e5b8d483bb3e2
SHA5122ebd2495ee8fefbf9aad051a8eb5f957d10649e58b69d979d8031f7c50e105661550f112bb3edb9299d3e55eeeb475ec61642009ee50094bac5f646c7360aff0
-
Filesize
524B
MD57deb6ef8314f66c791a5a3d433170d50
SHA1281c7d6d2dda6ded8b36204d2aca9be76fa95a84
SHA2569b1728ecd33c83d10c90df5cc1954f2758bd7e3b1cc48f240678975b2767edf9
SHA5121f7ef4abdaec9062336b23b87c37a59db9349cb5d0504df79e2b2437b808e18f3d19c14876dd6784de9bae7c99db567cb7b47395ec94d6ec91445f8944373f39
-
Filesize
9KB
MD5f9fd630bd7beb9e33342e082b33fa4ab
SHA1840a557ce077db2536576f334047199f7effeae0
SHA25656ae102374c1d649346dbf1e8fd20931bb6d7ff61037c75f9be90834abefc361
SHA5126a69067b638b76520a1f2a6b30400512e2b474fb3cf09054b86afed486bf89aec23d93f81999f1e077b4211daeaa2b55252f23e4f0855e0fdd3db08bcbbb2f8e
-
Filesize
9KB
MD5aafb1eb5029266078dbae3443a29ac35
SHA16f60bf0a9a89094c1d1c57db15614c1f4529d351
SHA25644f7c9ca521691d9a7e4a23516d1cfecf8fa39d66559e60b66ae0e02230fa4bb
SHA51245734f65cecf7dd2dedec546b0ad55d30eda5906089b69010333e23b68c7ef85caa9a6470ba53b14952a6c50562f36f1fc176badce3d2fe435239e937a01c64d
-
Filesize
9KB
MD556c357e54dcf0b1069e53b1243ff6a50
SHA1cfbffa967042515107de91b4f4cf64e180acd8e6
SHA256fc1ce1a07686284addc95218c434ac6afceef1c61e06ded9327f769db8ffe032
SHA512ceb91d18a34c099dcfbbbd13bfb39bd1bf62ddcb03bbaab641ca3bb841641c3490ae7233c32214600e8db851192cf2777c632945b112b39d7d2e59bb72edff73
-
Filesize
9KB
MD55f56748370c8b9a487d223c5ec979cf5
SHA1384f1c223447a78adacc9b8e3530f5aa380fc2d1
SHA256e82fa455b0d97defd9d47c847a4fe2040be5c2a23c5f9ced900245552cbc0fea
SHA5128c14c3bedce284f40711d865c684b57f77859abdc0c5bc30c1ad4ef596f9f64d42dab1f898f285ab07119a544e71696fee36a58d4b08838a470d1248d1d3a0e0
-
Filesize
15KB
MD5fde20e862b14d7d583303eeae44f86ba
SHA1a37fb48ddd253b7c5082420bc4ce229be9e4a3ad
SHA25637d5d33926ce32dd38e35dbb67b1b9627d7637ecc967ff9c203b87189cc376e8
SHA512df66172d375922b6f99b417a077c4aa277b2ac82d6155b05f495e117cc22d3e026f2af8548eb241aac1f81e482e4e6e6017e9d15b9d711dfe8a51ae802130d0a
-
Filesize
158KB
MD5180e288f539f51e5773e8da592efe101
SHA1370e294d8f8001ff6ddbb3487df689ff3c2363a4
SHA256169b192ccff597e3b487b2c908aac00e48e489f6c4f9be972fbff384b2f9e356
SHA512c740baa7982e28f0e244135f7fa210dbb25311c13ccaf3280aea9687840cfc045c7eb8543fde07f7b70f100c160a00de8bc0e3d038e583d448d6e3e901ffe3ae
-
Filesize
158KB
MD537ee8dfd79af4a4410354ea54c428dcc
SHA1295c803d4cbcba78bd4cdd0d60107fd84a4fced1
SHA2565930856c45d55b718695159711d896d0a535a8b6561573eaf2d707f2be91fe71
SHA5124073765ed3990d502ae9aed06044d6a02d73af026fe51c4488bad4daf12b377142b74961fd0a077296fded6833f9d1f6144ee4a7d685b4be67665fa08b4d2505
-
Filesize
2.3MB
MD54be144e00cac43d4f322b6a9baca9dad
SHA1735ffe42dc2b2bb128f7f146bbda37e9e9c4dc61
SHA256494c0daeef7a371cd33bc775b703b740eeaa463ff13fff51ef869fa958f003e4
SHA512a2c70a86029f73fa9ef9dd3fcbce8fc84073585674b65a935a1bde79b57935dbf530757074bad0b4307d9087f45651e4a89a3d84d930518a6da20d09f2bfd12c
-
Filesize
898KB
MD51b1ecd323162c054864b63ada693cd71
SHA1333a67545a5d1aad4d73a3501f7152b4529b6b3e
SHA256902337bbf17ac4e015e03d12e79b60b8dd5a8362496da3291a39e9124c58d9ff
SHA512f1776b6a457108f10ca940ce02ce98b73404f5cf18fccee4977024cfaf74d7f48666d4da9be1bee27531525e276cb8cfadba39b0c81e0fd8cbe42f7672f45b71
-
Filesize
1.1MB
MD51dc1aeb9d05e1693877fe7a78839bde5
SHA16b529fc7a99bcd54ef08a27d35c695849200845c
SHA2563ac02003a628a5e0cac34edaadc200038f10df96f5f926bbaf2f905419c3b1f2
SHA512baaa9742e1932e7f8a12c5400d1793086504c3cd5dc10a0cb7f1a953da375863e23aaf0e128c9d52931342738b7a2c950020e5338cd7c32de1ac96e6929294d8
-
Filesize
16.9MB
MD5c8a50a6f1f73df72de866f6131346e69
SHA137d99d5a8254cead586931f8b0c9b4cf031e0b4d
SHA25659e6a5009ce5e9547078db7f964bb8fc10ee999dd35b7e9243f119db8337aa8d
SHA5129f9230c58ddb8f029421a494220023253d725105ac2575d4ecd818c139dfaf77c7d559c58b66d764d78f3ffa19296f05af6a5d02f795b22512e6979671f2d745
-
Filesize
1.8MB
MD57f0867789e10a5edf7eee995468f2061
SHA1e83705193d8367e4281905a9d7b809bee0942543
SHA256445273fc3ce38a9fc2d1b1a2e9f9b43ddcbc6dedd813dba3d259984a8a706490
SHA51204b3a4bb6ca3da715ae6a6941fb27fc9bd5785130ebd9d70ad73f45354ebd7f6da1e075c2491a4351584fe3459d120c34d6875b1ab9610a138bdb14d722430a2
-
Filesize
35B
MD5ff59d999beb970447667695ce3273f75
SHA1316fa09f467ba90ac34a054daf2e92e6e2854ff8
SHA256065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2
SHA512d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d
-
Filesize
453KB
MD5405b7fbe8c0ed98620064f0cd80f24c4
SHA1bb9e45038e8a9f7b7cd0db62858ac65c74b74821
SHA2569dd8267e66dc584eecb3bece47e826d3189e41077f4083acdfc9a4f623b9c187
SHA5123dd4c407f6c2250d20c005e816e80ad442bb07f84ab02e25951331808fb4229219f9fddbcf1ac2e6d70985e3077a6401905f18a8b2c633e9d0a8b9cc6971b61d
-
Filesize
16KB
MD5c661a77c31f83c413a96b5537ad31989
SHA18a5a47e39a9efa9dc4de447d2ae4cd5e375e3557
SHA256cc5bb638cb34cbd386a906b7708eb62e05e3fc991a20bd060e1d84f722d29ff1
SHA512b86e45d36d8566b51f932f660ee9c3d79cea1a2eb34a9f7da7b2ccc5e50c74f319e8005e43d719c5722ec148ddddf1351a7f9edc430888e572b3884d1610b1aa
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD58ec9b858770ae71075f06a8ebc30210f
SHA1e54f2d1bb0b25b5c59c2eb26a55ac9a1d09a1d08
SHA2567c5a5eb9142e4cd3bbfbd9b9ed482c5a2471c3014f2449138783fe2b92f62339
SHA512abef1fb612996bb1c5d59f55b6163cc481c3f0cdb260946762d6829ee3ab4b4ee8829b511e0462b168ebac039d055440547804e560aec8699820a85cdadff553
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e