Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 20:03
Static task
static1
Behavioral task
behavioral1
Sample
a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe
Resource
win10v2004-20250217-en
General
-
Target
a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe
-
Size
3.0MB
-
MD5
81a426da814986b1b9ed5d5ec33764b9
-
SHA1
a3a0cff2e9d4678ae0a2b94e13b3ac721e1c6c17
-
SHA256
a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452
-
SHA512
f0def9cd228107006617f68966e7c2fbd8dcbd82faa8adec540d69d74e9f30d5d6987a8df771436508163dff5667377cc88604842bebc3ae5da720ca438be7a9
-
SSDEEP
49152:KzfKZsAGgwsEY0gkYChb/XDmhjzL70ckKzmisHWt69mPJJhdQt:Kb+sAVwsEY0gkYChbPDm1n0TKzmisa7m
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
vidar
ir7am
https://t.me/l793oy
https://steamcommunity.com/profiles/76561199829660832
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Signatures
-
Amadey family
-
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral2/memory/6704-1553-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/6704-1552-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/2280-1084-0x0000000000AA0000-0x0000000000EF0000-memory.dmp healer behavioral2/memory/2280-1085-0x0000000000AA0000-0x0000000000EF0000-memory.dmp healer behavioral2/memory/2280-1223-0x0000000000AA0000-0x0000000000EF0000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Litehttp family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 3040382df4.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 3040382df4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 3040382df4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 3040382df4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 3040382df4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 3040382df4.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 3040382df4.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 3040382df4.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 3040382df4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 3040382df4.exe -
Stealc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ COAR0YA43BYPYHU74QDVBMCS.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 254fe104e1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 74f00d4ba6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ CYINYYAKYIYBKEXJDRKU.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3040382df4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e35f5e2f67.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 17271eb936.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7807784176.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FvbuInU.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 6756 bitsadmin.exe -
Downloads MZ/PE file 25 IoCs
flow pid Process 158 4332 rapes.exe 158 4332 rapes.exe 158 4332 rapes.exe 158 4332 rapes.exe 158 4332 rapes.exe 158 4332 rapes.exe 158 4332 rapes.exe 262 336 7807784176.exe 262 336 7807784176.exe 262 336 7807784176.exe 262 336 7807784176.exe 262 336 7807784176.exe 262 336 7807784176.exe 353 4332 rapes.exe 40 1576 a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe 114 880 17271eb936.exe 51 4332 rapes.exe 51 4332 rapes.exe 51 4332 rapes.exe 51 4332 rapes.exe 51 4332 rapes.exe 51 4332 rapes.exe 51 4332 rapes.exe 83 5028 BitLockerToGo.exe 110 3180 BitLockerToGo.exe -
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 6328 msedge.exe 6320 msedge.exe 4480 chrome.exe 5220 chrome.exe 5424 msedge.exe 5736 msedge.exe 2020 chrome.exe 4356 chrome.exe 5372 chrome.exe 5440 msedge.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/files/0x0007000000023f58-1542.dat net_reactor behavioral2/memory/5736-1550-0x0000000000320000-0x0000000000380000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 26 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CYINYYAKYIYBKEXJDRKU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3040382df4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e35f5e2f67.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 74f00d4ba6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 17271eb936.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7807784176.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion COAR0YA43BYPYHU74QDVBMCS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 254fe104e1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CYINYYAKYIYBKEXJDRKU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 17271eb936.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7807784176.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3040382df4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion COAR0YA43BYPYHU74QDVBMCS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e35f5e2f67.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 254fe104e1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 74f00d4ba6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation COAR0YA43BYPYHU74QDVBMCS.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation rapes.exe -
Executes dropped EXE 30 IoCs
pid Process 2780 COAR0YA43BYPYHU74QDVBMCS.exe 4332 rapes.exe 1928 e35f5e2f67.exe 2088 3b3f13d12c.exe 4788 3b3f13d12c.exe 3748 3b3f13d12c.exe 1740 254fe104e1.exe 2528 74f00d4ba6.exe 880 17271eb936.exe 336 7807784176.exe 2976 rapes.exe 5252 CYINYYAKYIYBKEXJDRKU.exe 5808 2f6b756d17.exe 2280 3040382df4.exe 3080 zY9sqWs.exe 5084 Ps7WqSx.exe 6936 FvbuInU.exe 2504 rapes.exe 6512 SvhQA35.exe 6640 chromium.exe 5736 mAtJWNv.exe 6752 mAtJWNv.exe 6704 mAtJWNv.exe 6912 ce4pMzk.exe 4088 Y87Oyyz.exe 3964 Y87Oyyz.exe 2204 SplashWin.exe 6376 SplashWin.exe 4388 MCxU5Fj.exe 7100 MCxU5Fj.exe -
Identifies Wine through registry keys 2 TTPs 13 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 254fe104e1.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 17271eb936.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 7807784176.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine COAR0YA43BYPYHU74QDVBMCS.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine e35f5e2f67.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 74f00d4ba6.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine CYINYYAKYIYBKEXJDRKU.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 3040382df4.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine FvbuInU.exe -
Loads dropped DLL 56 IoCs
pid Process 336 7807784176.exe 336 7807784176.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 6640 chromium.exe 3964 Y87Oyyz.exe 2204 SplashWin.exe 2204 SplashWin.exe 2204 SplashWin.exe 6376 SplashWin.exe 6376 SplashWin.exe 6376 SplashWin.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 3040382df4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 3040382df4.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2f6b756d17.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106440101\\2f6b756d17.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3040382df4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106450101\\3040382df4.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\qhmX5hxi\\Anubis.exe\"" ce4pMzk.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\17271eb936.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106420101\\17271eb936.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7807784176.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106430101\\7807784176.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023dd9-265.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 1576 a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe 2780 COAR0YA43BYPYHU74QDVBMCS.exe 4332 rapes.exe 1928 e35f5e2f67.exe 1740 254fe104e1.exe 2528 74f00d4ba6.exe 880 17271eb936.exe 336 7807784176.exe 2976 rapes.exe 5252 CYINYYAKYIYBKEXJDRKU.exe 2280 3040382df4.exe 6936 FvbuInU.exe 2504 rapes.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2088 set thread context of 3748 2088 3b3f13d12c.exe 106 PID 1928 set thread context of 5028 1928 e35f5e2f67.exe 121 PID 1740 set thread context of 3180 1740 254fe104e1.exe 124 PID 5736 set thread context of 6704 5736 mAtJWNv.exe 198 PID 4388 set thread context of 7100 4388 MCxU5Fj.exe 209 PID 6376 set thread context of 6272 6376 SplashWin.exe 206 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job COAR0YA43BYPYHU74QDVBMCS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 532 2088 WerFault.exe 103 3232 5736 WerFault.exe 196 6292 4388 WerFault.exe 208 -
System Location Discovery: System Language Discovery 1 TTPs 37 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3040382df4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ps7WqSx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 254fe104e1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CYINYYAKYIYBKEXJDRKU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f6b756d17.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b3f13d12c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7807784176.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fltMC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COAR0YA43BYPYHU74QDVBMCS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 2f6b756d17.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 2f6b756d17.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FvbuInU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e35f5e2f67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17271eb936.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b3f13d12c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74f00d4ba6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mAtJWNv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mAtJWNv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7807784176.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7807784176.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 5800 taskkill.exe 5760 taskkill.exe 5880 taskkill.exe 5920 taskkill.exe 5868 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133856787049876958" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings rapes.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1576 a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe 1576 a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe 1576 a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe 1576 a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe 1576 a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe 1576 a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe 2780 COAR0YA43BYPYHU74QDVBMCS.exe 2780 COAR0YA43BYPYHU74QDVBMCS.exe 4332 rapes.exe 4332 rapes.exe 1928 e35f5e2f67.exe 1928 e35f5e2f67.exe 3748 3b3f13d12c.exe 3748 3b3f13d12c.exe 3748 3b3f13d12c.exe 3748 3b3f13d12c.exe 1740 254fe104e1.exe 1740 254fe104e1.exe 2528 74f00d4ba6.exe 2528 74f00d4ba6.exe 2528 74f00d4ba6.exe 2528 74f00d4ba6.exe 2528 74f00d4ba6.exe 2528 74f00d4ba6.exe 880 17271eb936.exe 880 17271eb936.exe 880 17271eb936.exe 880 17271eb936.exe 880 17271eb936.exe 880 17271eb936.exe 336 7807784176.exe 336 7807784176.exe 336 7807784176.exe 336 7807784176.exe 336 7807784176.exe 336 7807784176.exe 4480 chrome.exe 4480 chrome.exe 2976 rapes.exe 2976 rapes.exe 5252 CYINYYAKYIYBKEXJDRKU.exe 5252 CYINYYAKYIYBKEXJDRKU.exe 5808 2f6b756d17.exe 5808 2f6b756d17.exe 336 7807784176.exe 336 7807784176.exe 5808 2f6b756d17.exe 5808 2f6b756d17.exe 5004 msedge.exe 5004 msedge.exe 5828 msedge.exe 5828 msedge.exe 5828 msedge.exe 5828 msedge.exe 5424 msedge.exe 5424 msedge.exe 2280 3040382df4.exe 2280 3040382df4.exe 2280 3040382df4.exe 2280 3040382df4.exe 2280 3040382df4.exe 5828 msedge.exe 5828 msedge.exe 5828 msedge.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 6376 SplashWin.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2088 3b3f13d12c.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeDebugPrivilege 5880 taskkill.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeDebugPrivilege 5920 taskkill.exe Token: SeDebugPrivilege 5868 taskkill.exe Token: SeDebugPrivilege 5800 taskkill.exe Token: SeDebugPrivilege 5760 taskkill.exe Token: SeDebugPrivilege 5632 firefox.exe Token: SeDebugPrivilege 5632 firefox.exe Token: SeDebugPrivilege 2280 3040382df4.exe Token: SeDebugPrivilege 6640 chromium.exe Token: SeDebugPrivilege 6912 ce4pMzk.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2780 COAR0YA43BYPYHU74QDVBMCS.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 5808 2f6b756d17.exe 5808 2f6b756d17.exe 5808 2f6b756d17.exe 5808 2f6b756d17.exe 5808 2f6b756d17.exe 5808 2f6b756d17.exe 5808 2f6b756d17.exe 5808 2f6b756d17.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5808 2f6b756d17.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5808 2f6b756d17.exe 5808 2f6b756d17.exe 5808 2f6b756d17.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe 5424 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 5808 2f6b756d17.exe 5808 2f6b756d17.exe 5808 2f6b756d17.exe 5808 2f6b756d17.exe 5808 2f6b756d17.exe 5808 2f6b756d17.exe 5808 2f6b756d17.exe 5808 2f6b756d17.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5808 2f6b756d17.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5632 firefox.exe 5808 2f6b756d17.exe 5808 2f6b756d17.exe 5808 2f6b756d17.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5632 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1576 wrote to memory of 2780 1576 a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe 100 PID 1576 wrote to memory of 2780 1576 a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe 100 PID 1576 wrote to memory of 2780 1576 a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe 100 PID 2780 wrote to memory of 4332 2780 COAR0YA43BYPYHU74QDVBMCS.exe 101 PID 2780 wrote to memory of 4332 2780 COAR0YA43BYPYHU74QDVBMCS.exe 101 PID 2780 wrote to memory of 4332 2780 COAR0YA43BYPYHU74QDVBMCS.exe 101 PID 4332 wrote to memory of 1928 4332 rapes.exe 102 PID 4332 wrote to memory of 1928 4332 rapes.exe 102 PID 4332 wrote to memory of 1928 4332 rapes.exe 102 PID 4332 wrote to memory of 2088 4332 rapes.exe 103 PID 4332 wrote to memory of 2088 4332 rapes.exe 103 PID 4332 wrote to memory of 2088 4332 rapes.exe 103 PID 2088 wrote to memory of 4788 2088 3b3f13d12c.exe 105 PID 2088 wrote to memory of 4788 2088 3b3f13d12c.exe 105 PID 2088 wrote to memory of 4788 2088 3b3f13d12c.exe 105 PID 2088 wrote to memory of 3748 2088 3b3f13d12c.exe 106 PID 2088 wrote to memory of 3748 2088 3b3f13d12c.exe 106 PID 2088 wrote to memory of 3748 2088 3b3f13d12c.exe 106 PID 2088 wrote to memory of 3748 2088 3b3f13d12c.exe 106 PID 2088 wrote to memory of 3748 2088 3b3f13d12c.exe 106 PID 2088 wrote to memory of 3748 2088 3b3f13d12c.exe 106 PID 2088 wrote to memory of 3748 2088 3b3f13d12c.exe 106 PID 2088 wrote to memory of 3748 2088 3b3f13d12c.exe 106 PID 2088 wrote to memory of 3748 2088 3b3f13d12c.exe 106 PID 4332 wrote to memory of 1740 4332 rapes.exe 120 PID 4332 wrote to memory of 1740 4332 rapes.exe 120 PID 4332 wrote to memory of 1740 4332 rapes.exe 120 PID 1928 wrote to memory of 5028 1928 e35f5e2f67.exe 121 PID 1928 wrote to memory of 5028 1928 e35f5e2f67.exe 121 PID 1928 wrote to memory of 5028 1928 e35f5e2f67.exe 121 PID 1928 wrote to memory of 5028 1928 e35f5e2f67.exe 121 PID 1928 wrote to memory of 5028 1928 e35f5e2f67.exe 121 PID 1928 wrote to memory of 5028 1928 e35f5e2f67.exe 121 PID 1928 wrote to memory of 5028 1928 e35f5e2f67.exe 121 PID 1928 wrote to memory of 5028 1928 e35f5e2f67.exe 121 PID 1928 wrote to memory of 5028 1928 e35f5e2f67.exe 121 PID 1928 wrote to memory of 5028 1928 e35f5e2f67.exe 121 PID 4332 wrote to memory of 2528 4332 rapes.exe 123 PID 4332 wrote to memory of 2528 4332 rapes.exe 123 PID 4332 wrote to memory of 2528 4332 rapes.exe 123 PID 1740 wrote to memory of 3180 1740 254fe104e1.exe 124 PID 1740 wrote to memory of 3180 1740 254fe104e1.exe 124 PID 1740 wrote to memory of 3180 1740 254fe104e1.exe 124 PID 1740 wrote to memory of 3180 1740 254fe104e1.exe 124 PID 1740 wrote to memory of 3180 1740 254fe104e1.exe 124 PID 4332 wrote to memory of 880 4332 rapes.exe 125 PID 4332 wrote to memory of 880 4332 rapes.exe 125 PID 4332 wrote to memory of 880 4332 rapes.exe 125 PID 1740 wrote to memory of 3180 1740 254fe104e1.exe 124 PID 1740 wrote to memory of 3180 1740 254fe104e1.exe 124 PID 1740 wrote to memory of 3180 1740 254fe104e1.exe 124 PID 1740 wrote to memory of 3180 1740 254fe104e1.exe 124 PID 1740 wrote to memory of 3180 1740 254fe104e1.exe 124 PID 4332 wrote to memory of 336 4332 rapes.exe 126 PID 4332 wrote to memory of 336 4332 rapes.exe 126 PID 4332 wrote to memory of 336 4332 rapes.exe 126 PID 336 wrote to memory of 4480 336 7807784176.exe 127 PID 336 wrote to memory of 4480 336 7807784176.exe 127 PID 4480 wrote to memory of 4068 4480 chrome.exe 128 PID 4480 wrote to memory of 4068 4480 chrome.exe 128 PID 4480 wrote to memory of 4632 4480 chrome.exe 129 PID 4480 wrote to memory of 4632 4480 chrome.exe 129 PID 4480 wrote to memory of 4632 4480 chrome.exe 129 PID 4480 wrote to memory of 4632 4480 chrome.exe 129 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe"C:\Users\Admin\AppData\Local\Temp\a15e4db96250c2c494fa718b546e2efc974a366f5f40c9922d3458d891e9d452.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\COAR0YA43BYPYHU74QDVBMCS.exe"C:\Users\Admin\AppData\Local\Temp\COAR0YA43BYPYHU74QDVBMCS.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\10106380101\e35f5e2f67.exe"C:\Users\Admin\AppData\Local\Temp\10106380101\e35f5e2f67.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"5⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:5028
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106390101\3b3f13d12c.exe"C:\Users\Admin\AppData\Local\Temp\10106390101\3b3f13d12c.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\10106390101\3b3f13d12c.exe"C:\Users\Admin\AppData\Local\Temp\10106390101\3b3f13d12c.exe"5⤵
- Executes dropped EXE
PID:4788
-
-
C:\Users\Admin\AppData\Local\Temp\10106390101\3b3f13d12c.exe"C:\Users\Admin\AppData\Local\Temp\10106390101\3b3f13d12c.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 8205⤵
- Program crash
PID:532
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106400101\254fe104e1.exe"C:\Users\Admin\AppData\Local\Temp\10106400101\254fe104e1.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"5⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:3180
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106410101\74f00d4ba6.exe"C:\Users\Admin\AppData\Local\Temp\10106410101\74f00d4ba6.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\10106420101\17271eb936.exe"C:\Users\Admin\AppData\Local\Temp\10106420101\17271eb936.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:880 -
C:\Users\Admin\AppData\Local\Temp\CYINYYAKYIYBKEXJDRKU.exe"C:\Users\Admin\AppData\Local\Temp\CYINYYAKYIYBKEXJDRKU.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5252
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106430101\7807784176.exe"C:\Users\Admin\AppData\Local\Temp\10106430101\7807784176.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd8,0x104,0x7ffe7f5ecc40,0x7ffe7f5ecc4c,0x7ffe7f5ecc586⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1968,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1964 /prefetch:26⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1860,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2084 /prefetch:36⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2452 /prefetch:86⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3184,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3248 /prefetch:16⤵
- Uses browser remote debugging
PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3272 /prefetch:16⤵
- Uses browser remote debugging
PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4180,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4512 /prefetch:16⤵
- Uses browser remote debugging
PID:5220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4256,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3644 /prefetch:86⤵PID:5484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3640,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4864 /prefetch:86⤵PID:5524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4812,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4776 /prefetch:86⤵PID:5928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5008,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4272 /prefetch:86⤵PID:6012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4924,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4840 /prefetch:86⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4776,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5100 /prefetch:86⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5056,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4888 /prefetch:86⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5100,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5116 /prefetch:86⤵PID:5696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5144,i,7323123150223260478,4178970352357681545,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4848 /prefetch:26⤵
- Uses browser remote debugging
PID:5372
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7bf646f8,0x7ffe7bf64708,0x7ffe7bf647186⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,7016983774747455757,7273747329072813056,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:26⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,7016983774747455757,7273747329072813056,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,7016983774747455757,7273747329072813056,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:86⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2104,7016983774747455757,7273747329072813056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:16⤵
- Uses browser remote debugging
PID:5440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2104,7016983774747455757,7273747329072813056,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:16⤵
- Uses browser remote debugging
PID:5736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2104,7016983774747455757,7273747329072813056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:16⤵
- Uses browser remote debugging
PID:6320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2104,7016983774747455757,7273747329072813056,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4432 /prefetch:16⤵
- Uses browser remote debugging
PID:6328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,7016983774747455757,7273747329072813056,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:26⤵PID:6936
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106440101\2f6b756d17.exe"C:\Users\Admin\AppData\Local\Temp\10106440101\2f6b756d17.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5808 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5880
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5920
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5868
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5800
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:5644
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5632 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1908 -prefsLen 27368 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a26dffa8-7080-458d-8cee-4e5640233507} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" gpu7⤵PID:4204
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2408 -prefsLen 28288 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fa2f6c5c-a19b-4aa2-8a15-1a60075421b0} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" socket7⤵PID:5356
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3244 -childID 1 -isForBrowser -prefsHandle 3232 -prefMapHandle 3284 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8562cdc7-92a5-477d-b954-994d26eb21c6} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" tab7⤵PID:5528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4032 -childID 2 -isForBrowser -prefsHandle 4024 -prefMapHandle 3996 -prefsLen 32778 -prefMapSize 244628 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd2c5cd8-390f-4eff-b83e-24ae2b6f0878} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" tab7⤵PID:6000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4816 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4604 -prefMapHandle 4796 -prefsLen 32778 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {16d4095c-63b9-448b-a695-79eabb788ac9} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" utility7⤵
- Checks processor information in registry
PID:5712
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5252 -childID 3 -isForBrowser -prefsHandle 5264 -prefMapHandle 5260 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ac47a459-73ef-4bed-b804-fe3158c889a0} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" tab7⤵PID:4000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5468 -childID 4 -isForBrowser -prefsHandle 5388 -prefMapHandle 5392 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1987d782-f723-4b35-b1e4-e6827ac5c9e2} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" tab7⤵PID:4808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5660 -childID 5 -isForBrowser -prefsHandle 5580 -prefMapHandle 5584 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {92c9bf89-c0f8-4974-99e5-b11378278a5e} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" tab7⤵PID:5368
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106450101\3040382df4.exe"C:\Users\Admin\AppData\Local\Temp\10106450101\3040382df4.exe"4⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10106461121\fCsM05d.cmd"4⤵
- System Location Discovery: System Language Discovery
PID:6684 -
C:\Windows\SysWOW64\fltMC.exefltmc5⤵
- System Location Discovery: System Language Discovery
PID:6740
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\Admin\AppData\Local\Temp\vrep_install\vrep.msi"5⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:6756
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106470101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10106470101\zY9sqWs.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3080
-
-
C:\Users\Admin\AppData\Local\Temp\10106480101\Ps7WqSx.exe"C:\Users\Admin\AppData\Local\Temp\10106480101\Ps7WqSx.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5084
-
-
C:\Users\Admin\AppData\Local\Temp\10106490101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10106490101\FvbuInU.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6936
-
-
C:\Users\Admin\AppData\Local\Temp\10106500101\SvhQA35.exe"C:\Users\Admin\AppData\Local\Temp\10106500101\SvhQA35.exe"4⤵
- Executes dropped EXE
PID:6512 -
C:\Users\Admin\AppData\Local\Temp\onefile_6512_133856787614247764\chromium.exeC:\Users\Admin\AppData\Local\Temp\10106500101\SvhQA35.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6640
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106510101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10106510101\mAtJWNv.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5736 -
C:\Users\Admin\AppData\Local\Temp\10106510101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10106510101\mAtJWNv.exe"5⤵
- Executes dropped EXE
PID:6752
-
-
C:\Users\Admin\AppData\Local\Temp\10106510101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10106510101\mAtJWNv.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:6704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5736 -s 8085⤵
- Program crash
PID:3232
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106520101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10106520101\ce4pMzk.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:6912
-
-
C:\Users\Admin\AppData\Local\Temp\10106530101\Y87Oyyz.exe"C:\Users\Admin\AppData\Local\Temp\10106530101\Y87Oyyz.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4088 -
C:\Windows\Temp\{1F69084E-4FDC-4DFD-95C8-D0657E4719B3}\.cr\Y87Oyyz.exe"C:\Windows\Temp\{1F69084E-4FDC-4DFD-95C8-D0657E4719B3}\.cr\Y87Oyyz.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\10106530101\Y87Oyyz.exe" -burn.filehandle.attached=688 -burn.filehandle.self=6925⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3964 -
C:\Windows\Temp\{96732719-9183-4268-A67A-6C3EA41D0B43}\.ba\SplashWin.exeC:\Windows\Temp\{96732719-9183-4268-A67A-6C3EA41D0B43}\.ba\SplashWin.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exeC:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:6376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe8⤵
- System Location Discovery: System Language Discovery
PID:6272
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106540101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10106540101\MCxU5Fj.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\10106540101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10106540101\MCxU5Fj.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 7885⤵
- Program crash
PID:6292
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2088 -ip 20881⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2408
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:6068
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5736 -ip 57361⤵PID:4404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4388 -ip 43881⤵PID:7108
Network
MITRE ATT&CK Enterprise v15
Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Defense Evasion
BITS Jobs
1Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5daeec8fe8bc942f7cc206f1a7700b165
SHA1f7695b8e17df67468b8343c2bdffc235e24155b9
SHA25621de403a4220a44168f6dfddb9c277c20c9b0f5a41de8222987831aebe617acc
SHA5121f119620d0da767f063b4caac0df65ddc875ef9f895fc15fc928085eb5192876783329c5905a4af6deae15dab567f30116dcfc11ab6a5b2db779aa89e44332ea
-
Filesize
5.0MB
MD5c9e9d0ff551d031076d665da422b4d0c
SHA1d659b892520299de9fcdc58105f5d4d6bc82d3a8
SHA256bddaecbef4a1a4e06914d2f228c1b2cee22b7b32ddf8485e85bd0be993f441e6
SHA512883192e1d1a9bcc2f030bc541bc4aa6b415fac8df53ad670df09142dbf600116f7c220b4467bb05af2fee35ffa0225473b6328c411ab6f00f9f5970e4b10c18f
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
114KB
MD50ef27899243c792b7645a4f8ca777184
SHA134de718d559a8307db906f6fd74dbdc20eb6e745
SHA2566848e0220fb632a53168a0e99849784fd669e9d82da321d13d15f3dc6cd7c6bc
SHA5121f93f876c8c776af0745b1f29712db8d0373cc8e223d62f459f3f4abe017e2046e95eff78bbb5f754b0cd98c72d9a7b3e5b0c1868b42f79ae97d0ccab451bceb
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\bcef4798-eefa-4023-95d4-c4665d5883f0.dmp
Filesize826KB
MD50a05ee266f66e413a598b159724c1647
SHA11540947c5dee2eb323098fd4a31d7c064123c094
SHA25615b06c732ac29e0ff4f4acd627d6d92f93a0eb00d66eb3819ca0de520673fb7a
SHA5123597f64b89c0deb5d0101c7ba05d34f7f9b0c615900b2ad1622f7e134489267110fb67a81d30ffe7a30db83b5f0a5491a7dbe0b82ec4816cbe16c0e6b93f7376
-
Filesize
152B
MD51bed6483de34dd709e03fd3af839a76b
SHA13724a38c9e51fcce7955a59955d16bf68c083b92
SHA25637a42554c291f46995b2487d08d80d94cefe6c7fb3cb4ae9c7c5e515d6b5e596
SHA512264f6687ea8a8726b0000de1511b7b764b3d5a6f64946bb83a58effda42839e593de43865dafeeb89f5b78cc00d16f3979b417357fa2799ca0533bdf72f07fda
-
Filesize
152B
MD5fe6fb7ffeb0894d21284b11538e93bb4
SHA180c71bf18f3798129931b1781115bbef677f58f0
SHA256e36c911b7dbea599da8ed437b46e86270ce5e0ac34af28ac343e22ecff991189
SHA5123a8bd7b31352edd02202a7a8225973c10e3d10f924712bb3fffab3d8eea2d3d132f137518b5b5ad7ea1c03af20a7ab3ff96bd99ec460a16839330a5d2797753b
-
Filesize
152B
MD56b2f794095dfa2d293385fce458bee24
SHA1f4fb8d67890e6b9911f0a279913bf89ef9b08172
SHA256041a9ab74b2b9601e4aee6465aa2778aec096a9b8d5a25b7d7d73174601d4cb9
SHA5128221e6aa6d868294d5d67f4bc6296c9a47a95e94e8eeba7f99a62ffc9e1f6f531b2b1422a66da55cb95e9254f2bd4673426f47835ed5886b0188dcb9f7e31f4d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\02a4ac24-636d-4116-b39e-dba20e0f4304.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
5KB
MD5c33236da4545bb8cd93dc1a5ef7c6ddf
SHA13c382cda8ebe87d6eee7fb5bfa5921044f28a742
SHA2561f82ff2f41a4d5a1845bbf0ab582444032139fb29d96b3feaeb40d775a2cc7a3
SHA5123e24995690f824edd21c887d017b2936db94c5f880117b3da74ea1cae58da9265fafae7110fdc6f15b6ae3876e77b861e7f9629f9a446dddd528ed5e669dbf94
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD5993e177af1a7abbf14fb173e81ce3681
SHA19f3c0960bccb855841ff62efc330d096c5c7d718
SHA256d11294ccfc9446c779026a367df885237b92968343a5746b248557ff77b38220
SHA51215400b667e5ecd40cda1e7d12e3e02294b624a732cb189e658591b244dc74cd5711bc566613549f9808d56e50378be9094d8a2837de761f3820b246cc8923941
-
Filesize
3.8MB
MD5f7605fc9a28d7dec2cbee884066a34f4
SHA1074f8f0da6eb355d4a61e65a74cbb490b4f7c1bc
SHA256634496a27b42f3a1735986573b1376a36535d7081bf761de51e537b2ae8686ae
SHA512bc3b573e7856a70e5a2adc0ff2766756d5c3519263b0b520267cbcbe8472743cdf053738a00ad0457e2dfe90f83fd865e6cba997b5fa2ded2080e6f2c4936c37
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD56bdda91d3a775718db3118d910faab64
SHA179f565f59b7f21e19ce9b798856c78c5ee3cf2a5
SHA256334cb0a587c3bd2c2d7771f06f69a040ac999dc7d8c59fe8b25e63487d93b90f
SHA512f17b4a5b20ff7c4f7af55e5c381d7a95f8565bb4d131128af98ec2267381caca0193fbb37e51d95825987abfed53bbacec3a468216a1d375e0dee611f6c7b612
-
Filesize
1.8MB
MD5dfbd8254f8f452c4efee8f92f623923f
SHA15ae96189ce5bf17bdbf2804227221ba605cffc2b
SHA2566100c8b2a1b5b81783da1847a812af9c75849e44368cf9847eaea47e02b04699
SHA512d7940f24817cd2c180babce402a1f532e50785c1a9a69180f57a32091eb48f7112300c2e9ed4a07e8eae60accfc82acd1d3d8b1cf4a8e7bb6549b06f58c988a4
-
Filesize
3.0MB
MD5ff65bfe00947bd7568319a5e06e3c332
SHA1a401f331b7b3bb6bea6a852f2d97c4b44a0e65ac
SHA2567210557197cfb0efd433547275fb7d673d1c2a2b33eb667860f836b1062304e8
SHA5126a88659c654cb7639097f4ac38ff54783a7fe74197f7faed30d19d59eb93b38b9c4e2ba43611cdf86c0ada817a85d664303ef49aa356784391316bc340ad9207
-
Filesize
1.7MB
MD5df89694b5de799df7690296383fde7e1
SHA17691152d5e3598a3105a54bb317dfd9f35bb3f52
SHA2562694226d2ea2a4944ebaab5e2d4731d61d0f3901b81096f6d6b49f4fe6c32fd6
SHA5123b5cf4ff9b9ecb8e98efc529bf128b93ef8b2683d85ae112316dc37899cdc6149b5714fc688632ab31f5a708d9005068ecbdcf2de3c88a999e8ea03d2bdceca9
-
Filesize
948KB
MD599ef4f5addb1b75475d42ead433d48ef
SHA17d3e59c6cc7d027967240c14816725af3f36147f
SHA25636f1b9aa9e71520330396a1be5a497e79b158ba1c75158bbcf8a04fe40409e1a
SHA5124ee5dc695c0a1bed76c760054b503731c16168fe6226f6bc15a07ce4d62b40f6d9c0cf50a2f9080cd8a6c0949462e6982f09262e014d7bc25adfcd9d65fc28fc
-
Filesize
1.7MB
MD5382979f930a38c009b3f021de8e685b5
SHA1debf01d38290e135075f0622f5fa48c89af23379
SHA2562e87cea54454751631e62c93dd5da5ce7b4f89fb4f4e8067c4418c02d63d2ff2
SHA512fada5cccfe3b64384c105c8bda95824ddee9b99becd285a3c3bc86d692644844eb0dece570d3f4e83c3bdf64ccd68cb98aefe21b18cc77ff36060e41b48894ae
-
Filesize
1KB
MD59e4466ae223671f3afda11c6c1e107d1
SHA1438b65cb77e77a41e48cdb16dc3dee191c2729c7
SHA256ab289a1dc9ad423e385c539a539feec8c04604d17656c663e52e02ceebd4409f
SHA5123f7be864e567e1906f9227fe4b8e47a9f16032d732aecfc7256e581939e3b810bc6e696c4a80be670624e5fd08c336d539e23ed825bd823614a2fcda3b21f2aa
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
6.8MB
MD5dab2bc3868e73dd0aab2a5b4853d9583
SHA13dadfc676570fc26fc2406d948f7a6d4834a6e2c
SHA256388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb
SHA5123aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8
-
Filesize
1.8MB
MD5f155a51c9042254e5e3d7734cd1c3ab0
SHA19d6da9f8155b47bdba186be81fb5e9f3fae00ccf
SHA256560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af
SHA51267ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a
-
Filesize
11.5MB
MD59da08b49cdcc4a84b4a722d1006c2af8
SHA17b5af0630b89bd2a19ae32aea30343330ca3a9eb
SHA256215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd
SHA512579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
5.7MB
MD55fb40d81dac830b3958703aa33953f4f
SHA18f4689497df5c88683299182b8b888046f38c86a
SHA256b2395af2b5497ded848bfffc2192747510420b0a7bab9897322aed765c66d9dc
SHA51280b400bb79c4cbed1fb35af0fae1b88b399d679f7c99c625214082d143f51d381436abb27284b0205bdacf38cafa742a32c46ce8136ad7684d566d2e19bfab8e
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
1.8MB
MD51442c180ed5bb14173cb8d5065d3dcce
SHA191ed57fce88c360d91e4bad2d55e6aa2f65fcc78
SHA256ec6197b7fe8a623713043fb896673c6ff2fe5a48ca2dc69340a635c9deeeedee
SHA512148b7bfbf730481dba45abb3f59600d0eeb3b5b3afb80885ac3b7f3bcba3460226f793e2a135274f1a8bd6e8f637370e857866cf4e0c9447dcd44e3accceb78e
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4480_1378350255\79d48eea-1566-4feb-9266-58fb08e9b805.tmp
Filesize150KB
MD5eae462c55eba847a1a8b58e58976b253
SHA14d7c9d59d6ae64eb852bd60b48c161125c820673
SHA256ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad
SHA512494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4480_1378350255\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin
Filesize17KB
MD5c02ef58b02979d6f157635c043c3e439
SHA1a789f5f83df0b85e5dd8de0ad35daae97b0de6aa
SHA25616b75d1bdc468b681e7b6e5398acfaf8e6a02676a88d776e34eb43ddaff43264
SHA5121c3a7b6e4d53607e8b5a50bb54560da9a5533ad54365853b8ada2661d13df5a0c8b0e505c8553b702b5622c87fbb8a141b0bd52f5df4a5002398fa87040fe277
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin
Filesize13KB
MD51433fad9362231ef1d6fff722434f691
SHA156fc5af510d29d3c54c0742b32ee9d307bcff340
SHA2564f30872e80f3b6f8a54e901daa6198c9f5279a13f8366ed4163e4aa28974ccc0
SHA5121c20305df2e2695bb7c973f399c302492a857dfe9daeff6a0087b2adfa98dd3be4a67b9a03c5c77a3497ed80d574d03c463e458009b0a96379bc41b15aeb06f0
-
Filesize
224KB
MD59b694ad57a4361a69faf79ebcf8d00c1
SHA1934e386766d2843a23a1e9801d54baaf5c55b273
SHA2569e2c8c2c3a4397c82a6903040a67e9accf80fd6306b886251374e14b5c70f041
SHA5129c8d1d341d419429864c2e27c4db045e29e38d7351eb2fae236e2e41f5a7e22bc6ddb047b162a848f25be08b1ec590bb7bb003888b514ea9681d0e9c90dbf2e0
-
Filesize
256KB
MD5c34b203dc66437d4865aa1aa5d075d8a
SHA12a805af35df17e680e376bc317d1b376effe6f4c
SHA256490ca72c4ff205ddcb75e6aa344349796209f006013ff102258435be132cdeac
SHA51203bab4fc5dfc32a8f1e64ed7139a8ec84fe92b8b66435d75dc280f035cab85ef94fbec974862eb0e095bc466ab1714d26f497e1e9960580e7eeeca8a8343891d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5a2b374632bce52b3c11fec2c2da8345b
SHA17a21f5388474dcfd8cd3e5a596c123fada7f7446
SHA256d49d0c05334abd54211500d014b34d4080d19ad568cb3529dfc7a13b74c30e8f
SHA5126bc6f26511bcbe1ffa0cbacc9f24fdbae372c15be5ba754af66a12fc67c7fa38547dee2835d338cf07fd0cac3cf56a49bcbfe18ec0823ea090b68316c6c1f973
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp
Filesize28KB
MD596d2fdb1e4d8652d18e1a45151fce202
SHA1a18a9b64029f38c49e50be0e5415d58d18823498
SHA256835aa5b8758aec8fee8ccaaf9d1887f004b2c11360ffd72575714bfe30cc1aaa
SHA512b8913dc4d515578462cad119ffe2c8ddd1fc63842f5531ee7380156202cfe0e17748c189cdb78a8e85482adb9895b9410d19282d07b6b96c5f8cad3573f4db56
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\364545ff-d77a-4d61-b5d3-f24597152c08
Filesize982B
MD540680362c5ebd47c0c19858ea1a3b275
SHA1e09f21a44bd840b63463351d631a61d7dfe956d1
SHA2564503ba7c801e3b2ea051d5e6048cf2dec5917d362f8e9f365b25b0a0307b8edd
SHA512a2950468672a8b3fb3fba1d380afae993ad5e91876d825d043d1ac848341a79ba48216c3336fae4cf4ed7fc3fa9e52bdd8452fac0253138fff026be7ec4fbae9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\3f7a0aab-7258-47f4-9c12-21428fa9a8c0
Filesize671B
MD5e7540b8467add8f8c572ffb46664f1f9
SHA1996d38f4a044b6f5af3218ec2bfe316d2b104c25
SHA2568db0a3ad8ae4c6fb5e38911728aaf02838ee9da5fe089749910090570fbc93ac
SHA512499916cab057e38353ac71ca3a08fb7c45b2734bd63ec9db241fb5b07f4a3d4488c021927a4cc96ecb6e30d1c3eac2aef894399d9766eca245d2cba8a2e81b38
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\d32d6293-4236-492b-9cfd-3f5d5e675471
Filesize28KB
MD591d9fdb8914a493f3ea4a890f1015456
SHA19fb570321cfd224de2fb60faf774c6de2cfa8d21
SHA2564c2fd7a0b9919a52230cc769ce84181255dc21ebeb9f62073473fba383e1ada3
SHA512221324cbeaa770de19d8f72d113dda40a7ee1ec136539bca9d34456f21759304cd03b6ce50e5f0f3012a41d3098ec7056b7f0a55f35c233cda48b6c1d4567a6d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
1.4MB
MD5f81d72560584271450f6bab3d52dde76
SHA1ba36b906f631e94aa78b7570866f773c756b4a81
SHA256a9f7d3880be254abcfa15cfe029c8ea228d978ddc123392f12902407877fa56b
SHA5127f3b2c8d8b65bcc319c7dc68a2b12361033cdd5d657fb93dd1f4d3a8a410cdaebda93ef5de233b9aa29b35cd26d1203df2a4d15194dc5192aad1be26729ff05f
-
Filesize
9KB
MD57393adc10e337280c5affce9ea9fb449
SHA194c14b3b964d5e44bfd3aff85a19aa6616c67f2b
SHA25695ae66e0103361e1243690541c5227d99c55d766b6f1f33699985904d34c5d58
SHA5128ac821aae20afc8abd4869d7cbc51acf45c9c8b2cce1a424f95e7396f0f3de145f5606515d233503dfac16f979ba9565f4e9c419e514e309e00119f45d68b773
-
Filesize
10KB
MD5c3ef7921d08fe8751d5587d8a262e104
SHA17a867f8196fd81faf0bda2be88e3116948760667
SHA256ba99c188b32469fad486ac4827c3e804894d17cf7aa324b316709a3100ac2d6f
SHA51265364927ad78e5f06d6761af680dc74b74cef20cbaf810adb6041141a7ed4f485c0116f0132a1396dba12434181711849155deab7f61c31ea51139e8e7ea1668
-
Filesize
10KB
MD532905d3fc30a692c7e4d5cc83480c982
SHA15ddc5c3e3e4a4f3becc71ecc15c034ecdb10d36c
SHA25648b450352b252eecbb273dce13d10cd1221c847b858e36266cd0967d8b7ef60b
SHA512bdfb337b6cbe67bc0e580cdb7075f901fd99315b339d57c0841f54ca4edee47e61dec31e1c3b87e9ea5f1f1f508c872eedfb9d55311fac52c51b6afc7af4dd0b
-
Filesize
9KB
MD58ed368ac2146c71fd56e5e13426ac64d
SHA188dbb6a3985619da612d3c9270551e47de27c0e8
SHA256a73085333921250e01429fca45d00e30dc38bb90efe38edab0ef1e84c9d30a79
SHA51260935cfea3aaaef5908bbf2fbbd3e96f0c0d2258b4e26d4e1c8a98f7215c2eff9dc7916f07609f52e74bfc50dd570c06318b3f2ec143a0308d4480a01c40aa7b
-
Filesize
10KB
MD5a52b1aa75754044918f2cbd384d8489c
SHA1017566fb5e82f0a0290894db59040140d3d7eb28
SHA25697b8fbdaaf264176e148225f63528e9c9255bf96ee311b48d5366a5ab172457b
SHA51211ad1cbb6f64a2c13ba6dcd0ffe0206bad5a097a0397f2989d4400cf363327d0eb43ef99acf2b78d3d4a6aa50737e4712a47b4c0227df8232176f6f2358a08a7
-
Filesize
2KB
MD5092029ba4ad94069410e08fdbeeb96e9
SHA1d83c8c1a2e822b8fa47522315c5799be44168248
SHA2564e08b187ffbe3719b1b331746d09f5ba85553102b81b19f931a33d03131321ed
SHA5120b9a833cd9e0c47108f0a4619242890d073745d502dfaf88793d158cb0faa7fd40d8dc6513f9efc40db77aadcb8daa560073f75cf625f2e69611dbf2af77eb92